Algebraic Attacks on Block Ciphers Using Quantum Annealing

被引:6
|
作者
Burek, Elzbieta [1 ]
Wronski, Micha [1 ]
Mank, Krzysztof [1 ]
Misztal, Micha [1 ]
机构
[1] Mil Univ Technol, Dept Cybernet, PL-00908 Warsaw, Poland
关键词
Cryptanalysis; AES; block ciphers; algebraic attacks; quantum annealing; ALGORITHMS;
D O I
10.1109/TETC.2022.3143152
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the transformation method of the system of algebraic equations describing the symmetric cipher into the QUBO problem. After transformation of given equations f(0), f(1), . . . , f(n-1) to equations over integers f(0)', f(1)', . . . , f(n-1)', one can linearize each, obtaining f(lini)' = lin(f(i)'), for i = 0, n - 1, where lin denotes linearization operation. Finally, one can obtain problem in the QUBO form as (f(lin0)')(2) + . . . + (f(linn-1)')(2) + Pen - C, where Pen denotes penalties obtained during linearization of equations, n is the number of equations and C is constant appearing in the polynomial (f(lin0)')(2) + . . . + (f(linn-1)')(2) + Pen. This paper presents the transformation method of SPN block ciphers to the QUBO problem. What is more, we present the results of the transformation of the complete AES-128 cipher to the QUBO problem, where the number of variables of the equivalent QUBO problem equals approximately 30,026. It is worth noting that AES-128 is much easier to solve using quantum annealing than the factorization problem and the discrete logarithm problem of a similar level of security. For example, factorizing a 3072 bit long RSA integer using quantum annealing requires a QUBO problem of about 2,360,000 variables.
引用
收藏
页码:678 / 689
页数:12
相关论文
共 50 条
  • [21] Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts
    Courtois, Nicolas T.
    Debraize, Blandine
    RESEARCH IN CRYPTOLOGY, 2008, 4945 : 100 - +
  • [22] Combining Algebraic and Side Channel Attacks on Stream Ciphers
    Kazmi, Asif Raza
    Afzal, Mehreen
    Amjad, Muhammad Faisal
    Rashdi, Adnan
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 138 - 142
  • [23] Algebraic attacks on trivium-like stream ciphers
    Guan, Jie, 1600, Shanghai Jiaotong University (48):
  • [24] Algebraic attacks on clock-controlled stream ciphers
    Al-Hinai, Sultan
    Batten, Lynn
    Colbert, Bernard
    Wong, Kenneth
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 1 - 16
  • [25] Study of Probabilistic Scenarios of Algebraic Attacks on Stream Ciphers
    Pometun, S. A.
    JOURNAL OF AUTOMATION AND INFORMATION SCIENCES, 2009, 41 (02) : 67 - 80
  • [26] Algebraic attacks on clock-controlled cascade ciphers
    Wong, Kenneth Koon-Ho
    Colbert, Bernard
    Batten, Lynn
    Al-Hinai, Sultan
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 32 - +
  • [27] Open problems related to algebraic attacks on stream ciphers
    Canteaut, Anne
    CODING AND CRYPTOGRAPHY, 2006, 3969 : 120 - 134
  • [28] Fast algebraic attacks on stream ciphers with linear feedback
    Courtois, NT
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 176 - 194
  • [29] A NOTE ON SOME ALGEBRAIC TRAPDOORS FOR BLOCK CIPHERS
    Calderini, Marco
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2018, 12 (03) : 515 - 524
  • [30] Integral Attacks on Some Lightweight Block Ciphers
    Zhu, Shiqiang
    Wang, Gaoli
    He, Yu
    Qian, Haifeng
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (11) : 4502 - 4521