USING SIMON'S ALGORITHM TO ATTACK SYMMETRIC-KEY CRYPTOGRAPHIC PRIMITIVES

被引:2
|
作者
Santoli, Thomas [1 ]
Schaffner, Christian [2 ]
机构
[1] Univ Oxford, Math Inst, Andrew Wiles Bldg,Radcliffe Observ Quarter, Oxford OX2 6GG, England
[2] Univ Amsterdam, ILLC, CWI, QuSoft, POB 94242, NL-1090 GE Amsterdam, Netherlands
关键词
quantum cryptanalysis; Simon's algorithm; Feistel network; CBC-MAC; SIGNATURES; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present new connections between quantum information and the field of classical cryptography. In particular, we provide examples where Simon's algorithm can be used to show insecurity of commonly used cryptographic symmetric-key primitives. Specifically, these examples consist of a quantum distinguisher for the 3-round Feistel network and a forgery attack on CBC-MAC which forges a tag for a chosen-prefix message querying only other messages (of the same length). We assume that an adversary has quantum-oracle access to the respective classical primitives. Similar results have been achieved recently in independent work by Kaplan et al. [KLLNP16]. Our findings shed new light on the post-quantum security of cryptographic schemes and underline that classical security proofs of cryptographic constructions need to be revisited in light of quantum attackers.
引用
收藏
页码:65 / 78
页数:14
相关论文
共 50 条
  • [31] A Protocol for a Secure Remote Keyless Entry System Applicable in Vehicles using Symmetric-Key Cryptography
    Glocker, Tobias
    Mantere, Timo
    Elmusrati, Mohammed
    2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2017, : 310 - 315
  • [32] Forward/Backward Unforgeable Digital Signature Scheme Using Symmetric-Key Crypto-System
    Hwang, Tzonelih
    Gope, Prosanta
    Luo, Yi-Ping
    Liu, Zhi-Rou
    2016 INTERNATIONAL COMPUTER SYMPOSIUM (ICS), 2016, : 244 - 247
  • [33] Preventing Unknown Key-Share Attack using Cryptographic Bilinear Maps
    Chakraborty, Kalyan
    Mehta, Jay
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2014, 17 (02): : 135 - 147
  • [34] Evaluation of cryptographic key generation performance using evolutionary algorithm
    Ragavan, M.
    Prabu, K.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022, 13 (SUPPL 1) : 481 - 487
  • [35] Enhancing the cryptographic key using sample entropy and whale optimization algorithm
    Jawed M.S.
    Sajid M.
    International Journal of Information Technology, 2024, 16 (3) : 1733 - 1741
  • [36] A New Hybrid Symmetric-key Technique to Enhance Data Security of Textual Information using Random Number Generator
    Rakshitha
    Dodmane, Radhakrishna
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON), 2017, : 1438 - 1442
  • [37] A Hierarchical Key Derivative Symmetric Key Algorithm using Digital Logic
    Biswas, Chitra
    Das Gupta, Udayan
    Haque, Md. Mokammel
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION ENGINEERING (ECCE), 2017, : 604 - 609
  • [38] Fixed point attack in PGV-5 scheme using SIMON algorithm
    Risqi, Sofu Y. S.
    Yohanes, Steven
    Windarta, Susila
    THIRD INFORMATION SYSTEMS INTERNATIONAL CONFERENCE 2015, 2015, 72 : 292 - 299
  • [39] Using Frequency Analysis and Grover's Algorithm to Implement Known Ciphertext Attack on Symmetric Ciphers
    Ziatdinov, M.
    LOBACHEVSKII JOURNAL OF MATHEMATICS, 2013, 34 (04) : 313 - 315
  • [40] Symmetric Key Algorithm Using Vernam Cipher: VSA
    Pawar, Bhagyashri K.
    Hatkar, S. S.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 412 - 415