Quantum key recovery attacks on tweakable Even–Mansour ciphers

Ping Zhang1, Yiyuan Luo2
1School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, China
2School of Computer Science and Engineering, Huizhou University, Huizhou, China

Tóm tắt

Từ khóa


Tài liệu tham khảo

Cogliati, B., Lampe, R., Seurin, Y.: Tweaking Even–Mansour ciphers. In: Gennaro, R., Robshaw, M. (eds.) Advances in Cryptology—CRYPTO 2015—35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I. Lecture Notes in Computer Science, vol. 9215, pp. 189–208. Springer (2015). https://doi.org/10.1007/978-3-662-47989-6_9

Bathe, B.N., Anand, R., Dutta, S.: Evaluation of Grover’s algorithm toward quantum cryptanalysis on chacha. Quantum Inf. Process. 20(12), 394 (2021). https://doi.org/10.1007/s11128-021-03322-7

Bonnetain, X.: Quantum key-recovery on full AEZ. In: Adams, C., Camenisch, J. (eds.) Selected Areas in Cryptography—SAC 2017—24th International Conference, Ottawa, ON, Canada, August 16–18, 2017, Revised Selected Papers. Lecture Notes in Computer Science, vol. 10719, pp. 394–406. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-319-72565-9_20

Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: Quantum security analysis of AES. IACR Trans. Symmetric Cryptol. 2019(2), 55–93 (2019). https://doi.org/10.13154/tosc.v2019.i2.55-93

Cai, B., Gao, F., Leander, G.: Quantum attacks on two-round Even–Mansour. Front. Phys. 979 (2022)

Cui, J., Guo, J., Ding, S.: Applications of Simon’s algorithm in quantum attacks on Feistel variants. Quantum Inf. Process. 20(3), 117 (2021). https://doi.org/10.1007/s11128-021-03027-x

Dinur, I., Dunkelman, O., Keller, N., Shamir, A.: Key recovery attacks on iterated Even–Mansour encryption schemes. J. Cryptol. 29(4), 697–728 (2016). https://doi.org/10.1007/s00145-015-9207-3

Dong, X., Dong, B., Wang, X.: Quantum attacks on some Feistel block ciphers. Des. Codes Cryptogr. 88(6), 1179–1203 (2020). https://doi.org/10.1007/s10623-020-00741-y

Dong, X., Sun, S., Shi, D., Gao, F., Wang, X., Hu, L.: Quantum collision attacks on aes-like hashing with low quantum random access memories. In: Moriai, S., Wang, H. (eds.) Advances in Cryptology—ASIACRYPT 2020—26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II. Lecture Notes in Computer Science, vol. 12492, pp. 727–757. Springer, Heidelberg (2020). https://doi.org/10.1007/978-3-030-64834-3_25

Dong, X., Wang, X.: Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61(10), 102501–11025017 (2018). https://doi.org/10.1007/s11432-017-9468-y

Dunkelman, O., Keller, N., Shamir, A.: Slidex attacks on the Even–Mansour encryption scheme. J. Cryptol. 28(1), 1–28 (2015). https://doi.org/10.1007/s00145-013-9164-7

Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Miller, G.L. (ed.) Proceedings of the 28th Annual ACM Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22–24, 1996, pp. 212–219. ACM, New York (1996). https://doi.org/10.1145/237814.237866

Guo, T., Wang, P., Hu, L., Ye, D.: Attacks on beyond-birthday-bound macs in the quantum setting. In: Cheon, J.H., Tillich, J. (eds.) Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021, Proceedings. Lecture Notes in Computer Science, vol. 12841, pp. 421–441. Springer, Heidelberg (2021). https://doi.org/10.1007/978-3-030-81293-5_22

Guo, Z., Wu, W., Liu, R., Zhang, L.: Multi-key analysis of tweakable Even–Mansour with applications to minalpher and OPP. IACR Trans. Symmetric Cryptol. 2016(2), 288–306 (2016). https://doi.org/10.13154/tosc.v2016.i2.288-306

Hao, X., Zhang, F., Wei, Y., Zhou, Y.: Quantum period finding based on the Bernstein–Vazirani algorithm. Quantum Inf. Comput. 20(1 &2), 65–84 (2020). https://doi.org/10.26421/QIC20.1-2-4

Harrow, A.W., Hassidim, A., Lloyd, S.: Quantum algorithm for linear systems of equations. Phys. Rev. Lett. 103(15), 150502 (2009)

Hirose, S., Naito, Y., Sugawara, T.: Output masking of tweakable Even–Mansour can be eliminated for message authentication code. In: Avanzi, R., Heys, H.M. (eds.) Selected Areas in Cryptography—SAC 2016—23rd International Conference, St. John’s, NL, Canada, August 10–12, 2016, Revised Selected Papers. Lecture Notes in Computer Science, vol. 10532, pp. 341–359. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-319-69453-5_19

Hosoyamada, A., Aoki, K.: On quantum related-key attacks on iterated Even–Mansour ciphers. In: Obana, S., Chida, K. (eds.) Advances in Information and Computer Security—12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30–September 1, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10418, pp. 3–18. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-319-64200-0_1

Hosoyamada, A., Aoki, K.: On quantum related-key attacks on iterated Even–Mansour ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102–A(1), 27–34 (2019). https://doi.org/10.1587/transfun.E102.A.27

Hosoyamada, A., Aoki, K.: On quantum related-key attacks on iterated Even–Mansour ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102–A(1), 27–34 (2019). https://doi.org/10.1587/transfun.E102.A.27

Hosoyamada, A., Iwata, T.: 4-round Luby-Rackoff construction is a QPRP. In: Galbraith, S.D., Moriai, S. (eds.) Advances in Cryptology—ASIACRYPT 2019—25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I. Lecture Notes in Computer Science, vol. 11921, pp. 145–174. Springer, Heidelberg (2019). https://doi.org/10.1007/978-3-030-34578-5_6

Hosoyamada, A., Iwata, T.: Provably quantum-secure tweakable block ciphers. IACR Trans. Symmetric Cryptol. 2021(1), 337–377 (2021). https://doi.org/10.46586/tosc.v2021.i1.337-377

Hosoyamada, A., Sasaki, Y.: Quantum collision attacks on reduced SHA-256 and SHA-512. In: Malkin, T., Peikert, C. (eds.) Advances in Cryptology—CRYPTO 2021—41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part I. Lecture Notes in Computer Science, vol. 12825, pp. 616–646. Springer, Heidelberg (2021). https://doi.org/10.1007/978-3-030-84242-0_22

Ito, G., Hosoyamada, A., Matsumoto, R., Sasaki, Y., Iwata, T.: Quantum chosen-ciphertext attacks against Feistel ciphers. In: Matsui, M. (ed.) Topics in Cryptology—CT-RSA 2019—The Cryptographers’ Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings. Lecture Notes in Computer Science, vol. 11405, pp. 391–411. Springer, Heidelberg (2019). https://doi.org/10.1007/978-3-030-12612-4_20

Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology—CRYPTO 2016—36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14–18, 2016, Proceedings, Part II. Lecture Notes in Computer Science, vol. 9815, pp. 207–237. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53008-5_8

Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: IEEE International Symposium on Information Theory, ISIT 2010, June 13–18, 2010, Austin, Texas, USA, Proceedings, pp. 2682–2685. IEEE, Piscataway (2010). https://doi.org/10.1109/ISIT.2010.5513654

Kuwakado, H., Morii, M.: Security on the quantum-type Even–Mansour cipher. In: Proceedings of the International Symposium on Information Theory and Its Applications, ISITA 2012, Honolulu, HI, USA, October 28-31, 2012, pp. 312–316. Springer, Heidelberg (2012). https://ieeexplore.ieee.org/document/6400943/

Kim, H., Lee, Y., Lee, J.: Forking tweakable Even–Mansour ciphers. IACR Trans. Symmetric Cryptol. 2020(4), 71–87 (2020). https://doi.org/10.46586/tosc.v2020.i4.71-87

Liu, W., Gao, J.: Quantum security of grain-128/grain-128a stream cipher against HHL algorithm. Quantum Inf. Process. 20(10), 343 (2021). https://doi.org/10.1007/s11128-021-03275-x

Malviya, A.K., Tiwari, N., Chawla, M.: Quantum cryptanalytic attacks of symmetric ciphers: a review. Comput. Electr. Eng. 101, 108122 (2022). https://doi.org/10.1016/j.compeleceng.2022.108122

Mennink, B., Neves, S.: On the resilience of Even–Mansour to invariant permutations. Des. Codes Cryptogr. 89(5), 859–893 (2021). https://doi.org/10.1007/s10623-021-00850-2

Nan, J., Hu, H., Zhang, P., Luo, Y.: Quantum attacks against BBB secure PRFS or macs built from public random permutations. Quantum Inf. Process. 22(1), 26 (2023). https://doi.org/10.1007/s11128-022-03774-5

Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26(5), 1474–1483 (1997). https://doi.org/10.1137/S0097539796298637

Sun, H., Wei, C., Cai, B., Qin, S., Wen, Q., Gao, F.: Improved BV-based quantum attack on block ciphers. Quantum Inf. Process. 22(1), 9 (2023). https://doi.org/10.1007/s11128-022-03752-x

Wang, Z., Wei, S., Long, G., Hanzo, L.: Variational quantum attacks threaten advanced encryption standard based symmetric cryptography. Sci. China Inf. Sci. 65(10), (2022). https://doi.org/10.1007/s11432-022-3511-5

Xie, H., Yang, L.: Using bernstein-vazirani algorithm to attack block ciphers. Des. Codes Cryptogr. 87(5), 1161–1182 (2019). https://doi.org/10.1007/s10623-018-0510-5

Xie, H., Yang, L.: A quantum related-key attack based on the Bernstein–Vazirani algorithm. Quantum Inf. Process. 19(8), 240 (2020). https://doi.org/10.1007/s11128-020-02741-2

Xu, Y., Liu, W., Yu, W.: Quantum forgery attacks on copa, AES-COPA and marble authenticated encryption algorithms. Quantum Inf. Process. 20(4), 131 (2021). https://doi.org/10.1007/s11128-021-03036-w

Zhou, B., Yuan, Z.: Quantum key-recovery attack on Feistel constructions: Bernstein–Vazirani meet grover algorithm. Quantum Inf. Process. 20(10), 330 (2021). https://doi.org/10.1007/s11128-021-03256-0

Leander, G., May, A.: Grover meets simon—quantumly attacking the fx-construction. In: Takagi, T., Peyrin, T. (eds.) Advances in Cryptology—ASIACRYPT 2017—23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3–7, 2017, Proceedings, Part II. Lecture Notes in Computer Science, vol. 10625, pp. 161–178. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-319-70697-9_6

Alagic, G., Bai, C., Katz, J., Majenz, C.: Post-quantum security of the Even–Mansour cipher. In: Dunkelman, O., Dziembowski, S. (eds.) Advances in Cryptology—EUROCRYPT 2022—41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30–June 3, 2022, Proceedings, Part III. Lecture Notes in Computer Science, vol. 13277, pp. 458–487. Springer, Heidelberg (2022). https://doi.org/10.1007/978-3-031-07082-2_17

Shinagawa, K., Iwata, T.: Quantum attacks on sum of Even–Mansour pseudorandom functions. Inf. Process. Lett. 173, 106172 (2022). https://doi.org/10.1016/j.ipl.2021.106172

Zhang, P.: Quantum attacks on sum of Even–Mansour construction with linear key schedules. Entropy 24(2), 153 (2022). https://doi.org/10.3390/e24020153

Even, S., Mansour, Y.: A construction of a cipher from a single pseudorandom permutation. J. Cryptol. 10(3), 151–162 (1997). https://doi.org/10.1007/s001459900025

Chen, S., Lampe, R., Lee, J., Seurin, Y., Steinberger, J.P.: Minimizing the two-round even-mansour cipher. In: Garay, J.A., Gennaro, R. (eds.) Advances in Cryptology—CRYPTO 2014—34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17–21, 2014, Proceedings, Part I. Lecture Notes in Computer Science, vol. 8616, pp. 39–56. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-44371-2_3

Brassard, G., Høyer, P., Tapp, A.: Quantum cryptanalysis of hash and claw-free functions. SIGACT News 28(2), 14–19 (1997). https://doi.org/10.1145/261342.261346