Quantum impossible differential attacks: applications to AES and SKINNY

被引:0
|
作者
Nicolas David
María Naya-Plasencia
André Schrottenloher
机构
[1] Inria,
[2] Univ Rennes,undefined
[3] Inria,undefined
[4] CNRS,undefined
[5] IRISA,undefined
来源
关键词
Quantum cryptanalysis; Impossible differential attacks; Block ciphers; Skinny; 94A60; 68Q12; 81P68; 68P25;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper we propose the first efficient quantum version of key-recovery attacks on block ciphers based on impossible differentials, which was left as an open problem in previous work. These attacks work in two phases. First, a large number of differential pairs are collected, by solving a limited birthday problem with the attacked block cipher considered as a black box. Second, these pairs are filtered with respect to partial key candidates. We show how to translate the pair filtering step into a quantum procedure, and provide a complete analysis of its complexity. If the path of the attack can be properly reoptimized, this procedure can reach a significant speedup with respect to classical attacks. We provide two applications on SKINNY-128-256 and AES-192/256. These results do not threaten the security of these ciphers but allow us to better understand their (post-quantum) security margin.
引用
收藏
页码:723 / 751
页数:28
相关论文
共 50 条
  • [21] Square impossible differential attack and security of AES in known plaintext scenario
    Kara, Orhun
    CRYPTOLOGIA, 2025, 49 (02) : 128 - 152
  • [22] Impossible differential attack on seven-round AES-128
    Bahrok, B.
    Aref, M. R.
    IET INFORMATION SECURITY, 2008, 2 (02) : 28 - 32
  • [23] Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
    Derbez, Patrick
    Fouque, Pierre-Alain
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 157 - 184
  • [24] Impossible-differential attacks on large-block Rijndael
    Nakahara, Jorge, Jr.
    Pavao, Ivan Carlos
    Information Security, Proceedings, 2007, 4779 : 104 - 117
  • [25] Improved impossible differential attacks on large-block Rijndael
    Zhang, Lei
    Wu, Wenling
    Park, Je Hong
    Koo, Bon Wook
    Yeom, Yongjin
    INFORMATION SECURITY, PROCEEDINGS, 2008, 5222 : 298 - +
  • [26] Improved generic formula of time complexity on impossible differential attacks
    Liu Y.
    Diao Q.
    Li W.
    Liu Z.
    Zeng Z.
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2018, 40 (03): : 153 - 158
  • [27] New impossible differential attacks on reduced-round Crypton
    Mala, Hamid
    Shakiba, Mohsen
    Dakhilalian, Mohammad
    COMPUTER STANDARDS & INTERFACES, 2010, 32 (04) : 222 - 227
  • [28] Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
    Hadipour, Hosein
    Derbez, Patrick
    Eichlseder, Maria
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT IV, 2024, 14923 : 38 - 72
  • [29] Improved Rectangle Attacks on SKINNY and CRAFT
    Hadipour, Hosein
    Bagheri, Nasour
    Song, Ling
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021, 2021 (02) : 140 - 198
  • [30] Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1
    Taga, Bungo
    Moriai, Shiho
    Aoki, Kazumaro
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 17 - 33