Algebraic Attacks on Block Ciphers Using Quantum Annealing

被引:6
|
作者
Burek, Elzbieta [1 ]
Wronski, Micha [1 ]
Mank, Krzysztof [1 ]
Misztal, Micha [1 ]
机构
[1] Mil Univ Technol, Dept Cybernet, PL-00908 Warsaw, Poland
关键词
Cryptanalysis; AES; block ciphers; algebraic attacks; quantum annealing; ALGORITHMS;
D O I
10.1109/TETC.2022.3143152
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the transformation method of the system of algebraic equations describing the symmetric cipher into the QUBO problem. After transformation of given equations f(0), f(1), . . . , f(n-1) to equations over integers f(0)', f(1)', . . . , f(n-1)', one can linearize each, obtaining f(lini)' = lin(f(i)'), for i = 0, n - 1, where lin denotes linearization operation. Finally, one can obtain problem in the QUBO form as (f(lin0)')(2) + . . . + (f(linn-1)')(2) + Pen - C, where Pen denotes penalties obtained during linearization of equations, n is the number of equations and C is constant appearing in the polynomial (f(lin0)')(2) + . . . + (f(linn-1)')(2) + Pen. This paper presents the transformation method of SPN block ciphers to the QUBO problem. What is more, we present the results of the transformation of the complete AES-128 cipher to the QUBO problem, where the number of variables of the equivalent QUBO problem equals approximately 30,026. It is worth noting that AES-128 is much easier to solve using quantum annealing than the factorization problem and the discrete logarithm problem of a similar level of security. For example, factorizing a 3072 bit long RSA integer using quantum annealing requires a QUBO problem of about 2,360,000 variables.
引用
收藏
页码:678 / 689
页数:12
相关论文
共 50 条
  • [31] Experimental statistical attacks on block and stream ciphers
    Doroshenko, S.
    Fionov, A.
    Lubkin, A.
    Monarev, V.
    Ryabko, B.
    Shokin, Yu. I.
    COMPUTATIONAL SCIENCE AND HIGH PERFORMANCE COMPUTING III, 2008, 101 : 155 - +
  • [32] Block ciphers sensitive to Grobner basis attacks
    Buchmann, J
    Pyshkin, A
    Weinmann, RP
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 313 - 331
  • [33] Algebraic attacks on a class of stream ciphers with unknown output function
    N. Rajesh Pillai
    S. S. Bedi
    Designs, Codes and Cryptography, 2013, 69 : 317 - 330
  • [34] Algebraic attacks on a class of stream ciphers with unknown output function
    Pillai, N. Rajesh
    Bedi, S. S.
    DESIGNS CODES AND CRYPTOGRAPHY, 2013, 69 (03) : 317 - 330
  • [35] Rewriting variables: The complexity of fast algebraic attacks on stream ciphers
    Hawkes, P
    Rose, GG
    ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 390 - 406
  • [36] On the security of the LILI family of stream ciphers against algebraic attacks
    Al-Hinai, Sultan Zayid
    Dawson, Ed
    Henricksen, Matt
    Simpson, Leonie
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 11 - +
  • [37] Building Secure Block Ciphers on Generic Attacks Assumptions
    Patarin, Jacques
    Seurin, Yannick
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 : 66 - 81
  • [38] SQUARE attack on block ciphers with low algebraic degree
    Bing Sun
    RuiLin Li
    LongJiang Qu
    Chao Li
    Science China Information Sciences, 2010, 53 : 1988 - 1995
  • [39] SQUARE attack on block ciphers with low algebraic degree
    SUN Bing 1
    2 State Key Laboratory of Information Security
    3 National Mobile Communications Research Laboratory
    Science China(Information Sciences), 2010, 53 (10) : 1988 - 1995
  • [40] New Cryptanalysis of Block Ciphers with Low Algebraic Degree
    Sun, Bing
    Qu, Longjiang
    Li, Chao
    FAST SOFTWARE ENCRYPTION, 2009, 5665 : 180 - 192