Applying quantum search to a known-plaintext attack on two-key triple encryption

被引:0
|
作者
Phaneendra, H. D. [1 ,2 ]
Vidya, Raj C. [1 ,2 ]
Shivakumar, M. S. [1 ,2 ]
机构
[1] Natl Inst Engn, Dept Comp Sci & Engn, Mysore, Karnataka, India
[2] Natl Inst Engn, Mysore, Karnataka, India
来源
关键词
quantum mechanics; quantum algorithm; qubits; quantum search; 3DES; exhaustive search;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The process of disguising a plaintext into cipherext is called encryption and back into plaintext is called decryption. A cryptographic algorithm, is also called a cipher, is the mathematical function used for encryption and decryption. Many algorithms are available for this purpose. Triple DES is such an algorithm. Encryption using triple DES is possible in two different ways; they are triple DES with two keys and triple DES with three different keys. Cryptanalysis can be used to recover the plaintext of a message from the ciphertext without access to or knowing the key. Exhaustive key search remains the most practical and efficient attack on Triple DES with two keys. The principles of quantum mechanics can be used to build and analyze a quantum computer and its algorithms. Quantum searching is one such algorithm. The key search in Triple DES with two keys is possible using quantum search algorithm, which is more efficient compare to any other methods. In this paper we are presenting how quantum search can be used to crack Triple DES with two keys searching for a key.
引用
收藏
页码:171 / +
页数:2
相关论文
共 50 条
  • [41] Efficient Search Over Encrypted Medical Data With Known-Plaintext/Background Models and Unlinkability
    Abdelfattah, Sherif
    Baza, Mohamed
    Badr, Mahmoud M.
    Mahmoud, Mohamed M. E. A.
    Srivastava, Gautam
    Alsolami, Fawaz
    Ali, Abdullah Marish
    IEEE ACCESS, 2021, 9 : 151129 - 151141
  • [42] Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform
    Rajput, Sudheesh K.
    Nishchal, Naveen K.
    APPLIED OPTICS, 2013, 52 (04) : 871 - 878
  • [43] Guessing probability under unlimited known-plaintext attack on secret keys for Y00 quantum stream cipher by quantum multiple hypotheses testing
    Iwakoshi, Takehisa
    OPTICAL ENGINEERING, 2018, 57 (12)
  • [44] PA in the two-key setting and a generic conversion for encryption with anonymity
    Hayashi, Ryotaro
    Tanaka, Keisuke
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 271 - 282
  • [45] Fast two-key encryption for a secure E-mail application
    Ramani, S.
    Shrikumar, H.
    Proceedings of the International Conference on Computer Communication, 1991,
  • [46] Deterministic quantum-public-key encryption: Forward search attack and randomization
    Nikolopoulos, Georgios M.
    Ioannou, Lawrence M.
    PHYSICAL REVIEW A, 2009, 79 (04):
  • [47] Chosen plaintext attack on JPEG image encryption with adaptive key and run consistency
    He, Hongjie
    Yuan, Yuan
    Ye, Yuyun
    Tai, Heng-Ming
    Chen, Fan
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2023, 90
  • [48] Visually Secure Deep Joint Source-Channel Coding With Chaotic Map Against Deep Known-Plaintext Attack
    Fu, Yuyang
    Suto, Katsuya
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2025, 6 : 1847 - 1858
  • [49] Known-plaintext attack on optical cryptosystem based on projection-onto-constraint-sets algorithm and a 4f correlator
    State Key Laboratory of Precision Measurement Technology and Instrumentation, Tianjin University, Tianjin 300072, China
    不详
    Guangxue Xuebao, 2008, 3 (429-434):
  • [50] Known plaintext attack on double random phase encoding using fingerprint as key and a method for avoiding the attack
    Tashima, Hideaki
    Takeda, Masafumi
    Suzuki, Hiroyuki
    Obi, Takashi
    Yamaguchi, Masahiro
    Ohyama, Nagaaki
    OPTICS EXPRESS, 2010, 18 (13): : 13772 - 13781