Quantum key recovery attacks on tweakable Even–Mansour ciphers
Tóm tắt
Từ khóa
Tài liệu tham khảo
Cogliati, B., Lampe, R., Seurin, Y.: Tweaking Even–Mansour ciphers. In: Gennaro, R., Robshaw, M. (eds.) Advances in Cryptology—CRYPTO 2015—35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I. Lecture Notes in Computer Science, vol. 9215, pp. 189–208. Springer (2015). https://doi.org/10.1007/978-3-662-47989-6_9
Bathe, B.N., Anand, R., Dutta, S.: Evaluation of Grover’s algorithm toward quantum cryptanalysis on chacha. Quantum Inf. Process. 20(12), 394 (2021). https://doi.org/10.1007/s11128-021-03322-7
Bonnetain, X.: Quantum key-recovery on full AEZ. In: Adams, C., Camenisch, J. (eds.) Selected Areas in Cryptography—SAC 2017—24th International Conference, Ottawa, ON, Canada, August 16–18, 2017, Revised Selected Papers. Lecture Notes in Computer Science, vol. 10719, pp. 394–406. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-319-72565-9_20
Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: Quantum security analysis of AES. IACR Trans. Symmetric Cryptol. 2019(2), 55–93 (2019). https://doi.org/10.13154/tosc.v2019.i2.55-93
Cui, J., Guo, J., Ding, S.: Applications of Simon’s algorithm in quantum attacks on Feistel variants. Quantum Inf. Process. 20(3), 117 (2021). https://doi.org/10.1007/s11128-021-03027-x
Dinur, I., Dunkelman, O., Keller, N., Shamir, A.: Key recovery attacks on iterated Even–Mansour encryption schemes. J. Cryptol. 29(4), 697–728 (2016). https://doi.org/10.1007/s00145-015-9207-3
Dong, X., Dong, B., Wang, X.: Quantum attacks on some Feistel block ciphers. Des. Codes Cryptogr. 88(6), 1179–1203 (2020). https://doi.org/10.1007/s10623-020-00741-y
Dong, X., Sun, S., Shi, D., Gao, F., Wang, X., Hu, L.: Quantum collision attacks on aes-like hashing with low quantum random access memories. In: Moriai, S., Wang, H. (eds.) Advances in Cryptology—ASIACRYPT 2020—26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II. Lecture Notes in Computer Science, vol. 12492, pp. 727–757. Springer, Heidelberg (2020). https://doi.org/10.1007/978-3-030-64834-3_25
Dong, X., Wang, X.: Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61(10), 102501–11025017 (2018). https://doi.org/10.1007/s11432-017-9468-y
Dunkelman, O., Keller, N., Shamir, A.: Slidex attacks on the Even–Mansour encryption scheme. J. Cryptol. 28(1), 1–28 (2015). https://doi.org/10.1007/s00145-013-9164-7
Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Miller, G.L. (ed.) Proceedings of the 28th Annual ACM Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22–24, 1996, pp. 212–219. ACM, New York (1996). https://doi.org/10.1145/237814.237866
Guo, T., Wang, P., Hu, L., Ye, D.: Attacks on beyond-birthday-bound macs in the quantum setting. In: Cheon, J.H., Tillich, J. (eds.) Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings. Lecture Notes in Computer Science, vol. 12841, pp. 421–441. Springer, Heidelberg (2021). https://doi.org/10.1007/978-3-030-81293-5_22
Guo, Z., Wu, W., Liu, R., Zhang, L.: Multi-key analysis of tweakable Even–Mansour with applications to minalpher and OPP. IACR Trans. Symmetric Cryptol. 2016(2), 288–306 (2016). https://doi.org/10.13154/tosc.v2016.i2.288-306
Hao, X., Zhang, F., Wei, Y., Zhou, Y.: Quantum period finding based on the Bernstein–Vazirani algorithm. Quantum Inf. Comput. 20(1 &2), 65–84 (2020). https://doi.org/10.26421/QIC20.1-2-4
Harrow, A.W., Hassidim, A., Lloyd, S.: Quantum algorithm for linear systems of equations. Phys. Rev. Lett. 103(15), 150502 (2009)
Hirose, S., Naito, Y., Sugawara, T.: Output masking of tweakable Even–Mansour can be eliminated for message authentication code. In: Avanzi, R., Heys, H.M. (eds.) Selected Areas in Cryptography—SAC 2016—23rd International Conference, St. John’s, NL, Canada, August 10–12, 2016, Revised Selected Papers. Lecture Notes in Computer Science, vol. 10532, pp. 341–359. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-319-69453-5_19
Hosoyamada, A., Aoki, K.: On quantum related-key attacks on iterated Even–Mansour ciphers. In: Obana, S., Chida, K. (eds.) Advances in Information and Computer Security—12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30–September 1, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10418, pp. 3–18. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-319-64200-0_1
Hosoyamada, A., Aoki, K.: On quantum related-key attacks on iterated Even–Mansour ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102–A(1), 27–34 (2019). https://doi.org/10.1587/transfun.E102.A.27
Hosoyamada, A., Aoki, K.: On quantum related-key attacks on iterated Even–Mansour ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102–A(1), 27–34 (2019). https://doi.org/10.1587/transfun.E102.A.27
Hosoyamada, A., Iwata, T.: 4-round Luby-Rackoff construction is a QPRP. In: Galbraith, S.D., Moriai, S. (eds.) Advances in Cryptology—ASIACRYPT 2019—25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I. Lecture Notes in Computer Science, vol. 11921, pp. 145–174. Springer, Heidelberg (2019). https://doi.org/10.1007/978-3-030-34578-5_6
Hosoyamada, A., Iwata, T.: Provably quantum-secure tweakable block ciphers. IACR Trans. Symmetric Cryptol. 2021(1), 337–377 (2021). https://doi.org/10.46586/tosc.v2021.i1.337-377
Hosoyamada, A., Sasaki, Y.: Quantum collision attacks on reduced SHA-256 and SHA-512. In: Malkin, T., Peikert, C. (eds.) Advances in Cryptology—CRYPTO 2021—41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part I. Lecture Notes in Computer Science, vol. 12825, pp. 616–646. Springer, Heidelberg (2021). https://doi.org/10.1007/978-3-030-84242-0_22
Ito, G., Hosoyamada, A., Matsumoto, R., Sasaki, Y., Iwata, T.: Quantum chosen-ciphertext attacks against Feistel ciphers. In: Matsui, M. (ed.) Topics in Cryptology—CT-RSA 2019—The Cryptographers’ Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings. Lecture Notes in Computer Science, vol. 11405, pp. 391–411. Springer, Heidelberg (2019). https://doi.org/10.1007/978-3-030-12612-4_20
Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology—CRYPTO 2016—36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14–18, 2016, Proceedings, Part II. Lecture Notes in Computer Science, vol. 9815, pp. 207–237. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53008-5_8
Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: IEEE International Symposium on Information Theory, ISIT 2010, June 13–18, 2010, Austin, Texas, USA, Proceedings, pp. 2682–2685. IEEE, Piscataway (2010). https://doi.org/10.1109/ISIT.2010.5513654
Kuwakado, H., Morii, M.: Security on the quantum-type Even–Mansour cipher. In: Proceedings of the International Symposium on Information Theory and Its Applications, ISITA 2012, Honolulu, HI, USA, October 28-31, 2012, pp. 312–316. Springer, Heidelberg (2012). https://ieeexplore.ieee.org/document/6400943/
Kim, H., Lee, Y., Lee, J.: Forking tweakable Even–Mansour ciphers. IACR Trans. Symmetric Cryptol. 2020(4), 71–87 (2020). https://doi.org/10.46586/tosc.v2020.i4.71-87
Liu, W., Gao, J.: Quantum security of grain-128/grain-128a stream cipher against HHL algorithm. Quantum Inf. Process. 20(10), 343 (2021). https://doi.org/10.1007/s11128-021-03275-x
Malviya, A.K., Tiwari, N., Chawla, M.: Quantum cryptanalytic attacks of symmetric ciphers: a review. Comput. Electr. Eng. 101, 108122 (2022). https://doi.org/10.1016/j.compeleceng.2022.108122
Mennink, B., Neves, S.: On the resilience of Even–Mansour to invariant permutations. Des. Codes Cryptogr. 89(5), 859–893 (2021). https://doi.org/10.1007/s10623-021-00850-2
Nan, J., Hu, H., Zhang, P., Luo, Y.: Quantum attacks against BBB secure PRFS or macs built from public random permutations. Quantum Inf. Process. 22(1), 26 (2023). https://doi.org/10.1007/s11128-022-03774-5
Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26(5), 1474–1483 (1997). https://doi.org/10.1137/S0097539796298637
Sun, H., Wei, C., Cai, B., Qin, S., Wen, Q., Gao, F.: Improved BV-based quantum attack on block ciphers. Quantum Inf. Process. 22(1), 9 (2023). https://doi.org/10.1007/s11128-022-03752-x
Wang, Z., Wei, S., Long, G., Hanzo, L.: Variational quantum attacks threaten advanced encryption standard based symmetric cryptography. Sci. China Inf. Sci. 65(10), (2022). https://doi.org/10.1007/s11432-022-3511-5
Xie, H., Yang, L.: Using bernstein-vazirani algorithm to attack block ciphers. Des. Codes Cryptogr. 87(5), 1161–1182 (2019). https://doi.org/10.1007/s10623-018-0510-5
Xie, H., Yang, L.: A quantum related-key attack based on the Bernstein–Vazirani algorithm. Quantum Inf. Process. 19(8), 240 (2020). https://doi.org/10.1007/s11128-020-02741-2
Xu, Y., Liu, W., Yu, W.: Quantum forgery attacks on copa, AES-COPA and marble authenticated encryption algorithms. Quantum Inf. Process. 20(4), 131 (2021). https://doi.org/10.1007/s11128-021-03036-w
Zhou, B., Yuan, Z.: Quantum key-recovery attack on Feistel constructions: Bernstein–Vazirani meet grover algorithm. Quantum Inf. Process. 20(10), 330 (2021). https://doi.org/10.1007/s11128-021-03256-0
Leander, G., May, A.: Grover meets simon—quantumly attacking the fx-construction. In: Takagi, T., Peyrin, T. (eds.) Advances in Cryptology—ASIACRYPT 2017—23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3–7, 2017, Proceedings, Part II. Lecture Notes in Computer Science, vol. 10625, pp. 161–178. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-319-70697-9_6
Alagic, G., Bai, C., Katz, J., Majenz, C.: Post-quantum security of the Even–Mansour cipher. In: Dunkelman, O., Dziembowski, S. (eds.) Advances in Cryptology—EUROCRYPT 2022—41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30–June 3, 2022, Proceedings, Part III. Lecture Notes in Computer Science, vol. 13277, pp. 458–487. Springer, Heidelberg (2022). https://doi.org/10.1007/978-3-031-07082-2_17
Shinagawa, K., Iwata, T.: Quantum attacks on sum of Even–Mansour pseudorandom functions. Inf. Process. Lett. 173, 106172 (2022). https://doi.org/10.1016/j.ipl.2021.106172
Zhang, P.: Quantum attacks on sum of Even–Mansour construction with linear key schedules. Entropy 24(2), 153 (2022). https://doi.org/10.3390/e24020153
Even, S., Mansour, Y.: A construction of a cipher from a single pseudorandom permutation. J. Cryptol. 10(3), 151–162 (1997). https://doi.org/10.1007/s001459900025
Chen, S., Lampe, R., Lee, J., Seurin, Y., Steinberger, J.P.: Minimizing the two-round even-mansour cipher. In: Garay, J.A., Gennaro, R. (eds.) Advances in Cryptology—CRYPTO 2014—34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2014, Proceedings, Part I. Lecture Notes in Computer Science, vol. 8616, pp. 39–56. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-44371-2_3