A new quantum cryptanalysis method on block cipher Camellia

被引:5
|
作者
Li, Yanjun [1 ,2 ,3 ]
Lin, Hao [1 ]
Liang, Meng [1 ]
Sun, Ying [1 ]
机构
[1] Beijing Elect Sci & Technol Inst, Dept Cryptog & Technol, Beijing 100070, Peoples R China
[2] State Key Lab Cryptol, Beijing, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
关键词
FEISTEL STRUCTURES; ATTACK;
D O I
10.1049/ise2.12037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Symmetric cryptography is expected to be quantum safe when long-term security is needed. Kuwakado and Morii gave a 3-round quantum distinguisher of the Feistel cipher based on Simon's algorithm. However, the quantum distinguisher without considering the specific structure of the round function is not accurate enough. A new quantum cryptanalysis method for Feistel structure is studied here. It can make full use of the specific structure of the round function. The properties of Camellia round function and its linear transformation P are taken into account, and a 5-round quantum distinguisher is proposed. Then, the authors follow a key-recovery attack framework by Leander and May, that is, Grover-meet-Simon algorithm, and give a quantum key-recovery attack on 7-round Camellia in Q2 model with the time complexity of 2(24). It is the very first time that the specific structure of the round function is used to improve quantum attack on Camellia.
引用
收藏
页码:487 / 495
页数:9
相关论文
共 50 条
  • [41] Integral Cryptanalysis of Lightweight Block Cipher PIPO
    Kim, Sunyeop
    Kim, Jeseong
    Kim, Seonggyeom
    Hong, Deukjo
    Sung, Jaechul
    Hong, Seokhie
    IEEE ACCESS, 2022, 10 : 110195 - 110204
  • [42] Impossible Differential Cryptanalysis of LiCi Block Cipher
    Wei Yongzhuang
    Shi Jiali
    Li Lingchen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (07) : 1610 - 1617
  • [43] Cryptanalysis of Reduced round SKINNY Block Cipher
    Sadeghi, Sadegh
    Mohammadi, Tahereh
    Bagheri, Nasour
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (03) : 124 - 162
  • [44] Impossible Differential Cryptanalysis of the Raindrop Block Cipher
    Lu, Jiqiang
    Zhang, Xiao
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PT II, SCN 2024, 2024, 14974 : 206 - 227
  • [45] The 128-bit block cipher Camellia
    Aoki, K
    Ichikawa, T
    Kanda, M
    Matsui, M
    Moriai, S
    Nakajima, J
    Tokita, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (01) : 11 - 24
  • [46] Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
    Kim, Jongsung
    Lee, Changhoon
    Sung, Jaechul
    Hong, Seokhie
    Lee, Sangjin
    Lim, Jongin
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (10) : 3047 - 3058
  • [47] Cryptanalysis of Stream Cipher: Method Implementation
    Al-Sabaawi, Aiman
    2021 IEEE ASIA-PACIFIC CONFERENCE ON COMPUTER SCIENCE AND DATA ENGINEERING (CSDE), 2021,
  • [48] Cryptanalysis of Full-Round Magpie Block Cipher
    Yang, Yunxiao
    Sun, Bing
    Liu, Guoqiang
    CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (02) : 217 - 224
  • [49] Self-similarity cryptanalysis of the block cipher ITUbee
    Soleimany, Hadi
    IET INFORMATION SECURITY, 2015, 9 (03) : 179 - 184
  • [50] Formal function cryptanalysis of block cipher and its application
    Peng, Chang-Yong
    Zhu, Chuang-Ying
    Huang, Li
    Zhu, Yue-Fei
    Wang, Jin-Hui
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2013, 41 (11): : 2314 - 2316