Skip to main content
Top
Published in: Quantum Information Processing 11/2020

01-11-2020

A quantum distinguisher for 7/8-round SMS4 block cipher

Authors: S. Hodžić, L. R. Knudsen

Published in: Quantum Information Processing | Issue 11/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Constructions of quantum distinguishers (extended to key recovery attacks) for generalized Feistel networks have been recently proposed in several works, where the main focus has been on Type 1 and 2 schemes. In this work, we derive a quantum distinguisher for 7 and 8 rounds of the SMS4 block cipher, which belongs to the class of unbalanced (contracting) generalized Feistel schemes. In the former case, by applying Simon’s quantum algorithm we construct a quantum distinguisher that runs in (quantum) polynomial time \(\mathcal {O}(n)\) (n is the branch size), while later we need to combine Simon’s and Grover’s algorithms in context of the amplitude amplification technique. We show that for the 8-round SMS4 cipher a quantum distinguisher can be constructed in both Q1 and Q2 attack models. This is achieved by applying the method of asymmetric search of a period, introduced by Bonnetain et al. (Advances in cryptology ASIACRYPT 2019, LNCS, 2019), where online and offline queries to the encryption oracle are separated. In this context, we answer the open problem posed by Dong et al. (Sci China Inf Sci 62:22501, 2019), which has been left open for construction of quantum distinguishers for \(\ge 7\) rounds. Moreover, we show that for the specific instance when the quantum oracle for 8 rounds of SMS4 cipher is available, one can extract the master secret key with the same complexity and number of qubits required for the 8-round distinguisher.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
Following the notion of unicity distance, the sufficient number of pairs, in order to determine the key uniquely, is \(\ge \lceil \frac{k}{N}\rceil \). Here, k is size of the master secret key, and N is size of the input block. In our case, \(k=N=128\), and thus \(r\ge 2\) is sufficient.
 
Literature
1.
go back to reference Abbasi, I., Afzal, M.: A compact S-Box design for SMS4 block cipher. IT Convergence and Services. LNEE, vol. 107. Springer, Dordrecht, pp. 641–658 (2011) Abbasi, I., Afzal, M.: A compact S-Box design for SMS4 block cipher. IT Convergence and Services. LNEE, vol. 107. Springer, Dordrecht, pp. 641–658 (2011)
4.
go back to reference Bonnetain, X., Plasencia, M.N.: Hidden shift quantum cryptanalysis and implications. Advances in Cryptology ASIACRYPT 2018, LNCS, vol. 11272, pp. 560–592 (2018) Bonnetain, X., Plasencia, M.N.: Hidden shift quantum cryptanalysis and implications. Advances in Cryptology ASIACRYPT 2018, LNCS, vol. 11272, pp. 560–592 (2018)
5.
go back to reference Bonnetain, X., Plasencia, M.N., Schrottenloher, A.: On quantum Slide attacks. Selected Areas in Cryptography SAC 2019, LNCS, vol. 11959, pp. 492–519 (2019) Bonnetain, X., Plasencia, M.N., Schrottenloher, A.: On quantum Slide attacks. Selected Areas in Cryptography SAC 2019, LNCS, vol. 11959, pp. 492–519 (2019)
6.
go back to reference Bonnetain, X., Hosoyamada, A., Plasencia, M.N., Sasaki, Y., Schrottenloher, A.: Quantum attacks without superposition queries: the offline Simon algorithm. Advances in Cryptology ASIACRYPT 2019, LNCS, vol. 11921, pp. 552–583 (2019) Bonnetain, X., Hosoyamada, A., Plasencia, M.N., Sasaki, Y., Schrottenloher, A.: Quantum attacks without superposition queries: the offline Simon algorithm. Advances in Cryptology ASIACRYPT 2019, LNCS, vol. 11921, pp. 552–583 (2019)
7.
go back to reference Brassard, G., Høyer, P., Mosca, M., Tapp, A.: Quantum amplitude amplification and estimation. Quantum Computation and Information (Washington, DC, 2000), Contemporary Mathematics, vol. 305, pp. 53–74 (2002) Brassard, G., Høyer, P., Mosca, M., Tapp, A.: Quantum amplitude amplification and estimation. Quantum Computation and Information (Washington, DC, 2000), Contemporary Mathematics, vol. 305, pp. 53–74 (2002)
10.
go back to reference Dong, X., Li, Z., Wang, X.: Quantum cryptanalysis on some generalized Feistel schemes. Sci. China Inf. Sci. 62, 22501 (2019)MathSciNetCrossRef Dong, X., Li, Z., Wang, X.: Quantum cryptanalysis on some generalized Feistel schemes. Sci. China Inf. Sci. 62, 22501 (2019)MathSciNetCrossRef
11.
go back to reference Dong, X., Wang, X.: Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61, 102501 (2019)CrossRef Dong, X., Wang, X.: Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61, 102501 (2019)CrossRef
12.
go back to reference Feistel, H., Notz, W.A., Smith, J.L.: Some cryptographic techniques for machine-to-machine data communications. Proc. IEEE 63(11), 1545–1554 (1975)CrossRef Feistel, H., Notz, W.A., Smith, J.L.: Some cryptographic techniques for machine-to-machine data communications. Proc. IEEE 63(11), 1545–1554 (1975)CrossRef
13.
go back to reference Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, Pennsylvania, USA, May 22–24, pp. 212–219 (1996) Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, Pennsylvania, USA, May 22–24, pp. 212–219 (1996)
14.
go back to reference Hao, X., Zhang, F., Wei, Y., Zhou, Y.: Quantum period finding based on the Bernstein–Vazirani algorithm. Quantum Inf. Comput. 20(1–2), 65–84 (2020)MathSciNet Hao, X., Zhang, F., Wei, Y., Zhou, Y.: Quantum period finding based on the Bernstein–Vazirani algorithm. Quantum Inf. Comput. 20(1–2), 65–84 (2020)MathSciNet
15.
go back to reference Hosoyamada, A., Aoki, K.: On quantum related-key attacks on iterated Even-Mansour ciphers. Advances in Information and Computer Security, International Workshop on Security IWSEC 2017, LNCS, vol. 10418, pp. 3–18 (2017) Hosoyamada, A., Aoki, K.: On quantum related-key attacks on iterated Even-Mansour ciphers. Advances in Information and Computer Security, International Workshop on Security IWSEC 2017, LNCS, vol. 10418, pp. 3–18 (2017)
16.
go back to reference Hosoyamada, A., Sasaki, Y.: Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. In: International Conference on Security and Cryptography for Networks, Security and Cryptography for Networks, LNCS, vol. 11035, pp. 386–403 (2018) Hosoyamada, A., Sasaki, Y.: Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. In: International Conference on Security and Cryptography for Networks, Security and Cryptography for Networks, LNCS, vol. 11035, pp. 386–403 (2018)
17.
go back to reference Ito, G., Hosoyamada, A., Matsumoto, R., Sasaki, Y., Iwata, T.: Quantum chosen-ciphertext attacks against Feistel ciphers. Cryptographers Track at the RSA Conference, CT-RSA 2019: Topics in Cryptology CT-RSA 2019, LNCS, vol. 11405, pp. 391–411 (2019) Ito, G., Hosoyamada, A., Matsumoto, R., Sasaki, Y., Iwata, T.: Quantum chosen-ciphertext attacks against Feistel ciphers. Cryptographers Track at the RSA Conference, CT-RSA 2019: Topics in Cryptology CT-RSA 2019, LNCS, vol. 11405, pp. 391–411 (2019)
19.
go back to reference Kaplan, M., Leurent, G., Leverrier, A., Plasencia, M.N.: Breaking symmetric cryptosystems using quantum period finding. CRYPTO 2016: Advances in Cryptology CRYPTO 2016, LNCS, vol. 9815. Springer, Berlin, Heidelberg, pp. 207–237 (2016) Kaplan, M., Leurent, G., Leverrier, A., Plasencia, M.N.: Breaking symmetric cryptosystems using quantum period finding. CRYPTO 2016: Advances in Cryptology CRYPTO 2016, LNCS, vol. 9815. Springer, Berlin, Heidelberg, pp. 207–237 (2016)
21.
go back to reference Kuwakado, H., Morii, M.: Security on the quantum-type Even-Mansour cipher. In: International Symposium on Information Theory and its Applications, October 28–31, Honolulu, HI, USA (2012) Kuwakado, H., Morii, M.: Security on the quantum-type Even-Mansour cipher. In: International Symposium on Information Theory and its Applications, October 28–31, Honolulu, HI, USA (2012)
22.
go back to reference Leander, G., May, A.: Grover meets Simon quantumly attacking the FX-construction. In: Advances in Cryptology ASIACRYPT 2017, International Conference on the Theory and Application of Cryptology and Information Security, LNCS, vol. 10625, pp. 161–178 (2017) Leander, G., May, A.: Grover meets Simon quantumly attacking the FX-construction. In: Advances in Cryptology ASIACRYPT 2017, International Conference on the Theory and Application of Cryptology and Information Security, LNCS, vol. 10625, pp. 161–178 (2017)
23.
go back to reference Liu, F., Ji, W., Hu, L., Ding, J., Lv, S., Pyshkin, A., Weinmann, R.-P.: Analysis of the SMS4 block cipher. In: Australasian Conference on Information Security and Privacy, Information Security and Privacy, LNCS, vol. 4586. Springer, Berlin, Heidelberg, pp. 158–170 (2007) Liu, F., Ji, W., Hu, L., Ding, J., Lv, S., Pyshkin, A., Weinmann, R.-P.: Analysis of the SMS4 block cipher. In: Australasian Conference on Information Security and Privacy, Information Security and Privacy, LNCS, vol. 4586. Springer, Berlin, Heidelberg, pp. 158–170 (2007)
24.
go back to reference Matsui, M.: New block encryption algorithm MISTY. In: International Workshop on Fast Software Encryption, LNCS, vol. 1267. Springer, Berlin, Heidelberg, pp. 54–68 (2006) Matsui, M.: New block encryption algorithm MISTY. In: International Workshop on Fast Software Encryption, LNCS, vol. 1267. Springer, Berlin, Heidelberg, pp. 54–68 (2006)
26.
go back to reference Röetteler, M., Steinwandt, R.: A note on quantum related-key attacks. Inf. Process. Lett. 115(1), 40–44 (2015)CrossRef Röetteler, M., Steinwandt, R.: A note on quantum related-key attacks. Inf. Process. Lett. 115(1), 40–44 (2015)CrossRef
27.
go back to reference Santoli, T., Schaffner, C.: Using Simon’s algorithm to attack symmetric-key cryptographic primitives. Quantum Inf. Comput. 17(1–2), 65–78 (2017)MathSciNet Santoli, T., Schaffner, C.: Using Simon’s algorithm to attack symmetric-key cryptographic primitives. Quantum Inf. Comput. 17(1–2), 65–78 (2017)MathSciNet
29.
go back to reference Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, IEEE Computer Society Washington, DC, USA, pp. 124–134 (1994) Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, IEEE Computer Society Washington, DC, USA, pp. 124–134 (1994)
30.
go back to reference Xu, L., Guo, J., Cui, J., Li, M.: Key-recovery attacks on LED-like block ciphers. Tsinghua Sci. Technol. 24(5), 585–595 (2019)CrossRef Xu, L., Guo, J., Cui, J., Li, M.: Key-recovery attacks on LED-like block ciphers. Tsinghua Sci. Technol. 24(5), 585–595 (2019)CrossRef
31.
go back to reference Zhang, L.T., Wu, W.L.: Pseudorandomness and super pseudorandomness on the unbalanced Feistel networks with contracting functions. China J. Comput. 32, 1320–1330 (2009)MathSciNetCrossRef Zhang, L.T., Wu, W.L.: Pseudorandomness and super pseudorandomness on the unbalanced Feistel networks with contracting functions. China J. Comput. 32, 1320–1330 (2009)MathSciNetCrossRef
Metadata
Title
A quantum distinguisher for 7/8-round SMS4 block cipher
Authors
S. Hodžić
L. R. Knudsen
Publication date
01-11-2020
Publisher
Springer US
Published in
Quantum Information Processing / Issue 11/2020
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-020-02929-6

Other articles of this Issue 11/2020

Quantum Information Processing 11/2020 Go to the issue