Skip to main content
Erschienen in: Quantum Information Processing 3/2021

01.03.2021

Applications of Simon’s algorithm in quantum attacks on Feistel variants

verfasst von: Jingyi Cui, Jiansheng Guo, Shuzhen Ding

Erschienen in: Quantum Information Processing | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Simon’s algorithm is a well-known quantum algorithm which can achieve an exponential acceleration over classical algorithm. It has been widely used in quantum cryptanalysis of many cryptographic primitives. This paper concentrates on studying the applications of Simon’s algorithm in analyzing the security of Feistel variants, several well-known cryptographic structures derived from the Feistel structure. First, we propose a definition of weakly periodic function to relax the original strong Simon’s promise. Based on this definition, we define and analyze several extensions of Simon’s problem which expand the application of Simon’s algorithm. Furthermore, based on one extended Simon’s problem, we show new polynomial-time quantum distinguishing attacks on several Feistel variants: MISTY L/R, CAST256-like, CLEFIA-like, MARS-like, SMS4-like and Skipjack-A/B-like schemes. These new results show that classically secure schemes may be no longer secure in the Q2 model. Finally, based on the quantum distinguishers introduced above, we extend several rounds forward or backward to propose corresponding quantum all subkeys recovery attacks that can recover all subkeys in the Q2 model with lower query complexities than those in the Q1 model by using Grover’s algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Broadbent, A., Schaffner, C.: Quantum cryptography beyond quantum key distribution. Des. Codes Crypt. 78(1), 351–382 (2016)MathSciNetCrossRef Broadbent, A., Schaffner, C.: Quantum cryptography beyond quantum key distribution. Des. Codes Crypt. 78(1), 351–382 (2016)MathSciNetCrossRef
2.
Zurück zum Zitat Hosoyamada, A., Sasaki, Y.: Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. In: International Conference on Security and Cryptography for Networks, pp. 386–403 (2018) Hosoyamada, A., Sasaki, Y.: Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. In: International Conference on Security and Cryptography for Networks, pp. 386–403 (2018)
4.
Zurück zum Zitat Bonnetain, X.: Quantum key-recovery on full AEZ. In: SAC 2017, pp. 394–406 (2017) Bonnetain, X.: Quantum key-recovery on full AEZ. In: SAC 2017, pp. 394–406 (2017)
5.
Zurück zum Zitat Hosoyamada, A., Sasaki, Y.: Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations. In: RSA 2018, pp. 198–218 (2018) Hosoyamada, A., Sasaki, Y.: Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations. In: RSA 2018, pp. 198–218 (2018)
6.
Zurück zum Zitat Mossayebi, S.: A concrete security treatment of symmetric encryption in a quantum computing world. Ph.D. Thesis, The University of London (2015) Mossayebi, S.: A concrete security treatment of symmetric encryption in a quantum computing world. Ph.D. Thesis, The University of London (2015)
7.
Zurück zum Zitat Boneh, D., Dagdelen, Ö., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 41–69 (2011) Boneh, D., Dagdelen, Ö., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 41–69 (2011)
8.
Zurück zum Zitat Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: CRYPTO 2016, pp. 207–237 (2016) Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: CRYPTO 2016, pp. 207–237 (2016)
9.
Zurück zum Zitat Zhandry, M.: How to construct quantum random functions. In: 53rd Annual IEEE Symposium on Foundations of Computer Science, pp. 679–687 (2012) Zhandry, M.: How to construct quantum random functions. In: 53rd Annual IEEE Symposium on Foundations of Computer Science, pp. 679–687 (2012)
10.
Zurück zum Zitat Damgård, I., Funder, J., Nielsen, J. B., Salvail, L.: Superposition attacks on cryptographic protocols. In: ICITS 2013, pp. 142–161 (2013) Damgård, I., Funder, J., Nielsen, J. B., Salvail, L.: Superposition attacks on cryptographic protocols. In: ICITS 2013, pp. 142–161 (2013)
11.
Zurück zum Zitat Boneh, D., Zhandry, M.: Secure signatures and chosen ciphertext security in a quantum computing world. In: CRYPTO 2013, pp. 361–379 (2013) Boneh, D., Zhandry, M.: Secure signatures and chosen ciphertext security in a quantum computing world. In: CRYPTO 2013, pp. 361–379 (2013)
12.
Zurück zum Zitat Boneh, D., Zhandry, M.: Quantum-secure message authentication codes. In: EUROCRYPT 2013, pp. 592–608 (2013) Boneh, D., Zhandry, M.: Quantum-secure message authentication codes. In: EUROCRYPT 2013, pp. 592–608 (2013)
14.
Zurück zum Zitat Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: IEEE International Symposium on Information Theory, pp. 2682–2685 (2010) Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: IEEE International Symposium on Information Theory, pp. 2682–2685 (2010)
15.
Zurück zum Zitat Kuwakado, H., Morii, M.: Security on the quantum-type Even-Mansour cipher. In: International Symposium on Information Theory and its Applications, pp. 312–316 (2012) Kuwakado, H., Morii, M.: Security on the quantum-type Even-Mansour cipher. In: International Symposium on Information Theory and its Applications, pp. 312–316 (2012)
17.
Zurück zum Zitat Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: On quantum slide attacks. In: SAC 2019, pp. 492–519 (2019) Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: On quantum slide attacks. In: SAC 2019, pp. 492–519 (2019)
18.
Zurück zum Zitat Ito, G., Hosoyamada, A., Matsumoto, R., Sasaki, Y., Iwata, T.: Quantum chosen-ciphertext attacks against Feistel ciphers. In: RSA 2019, pp. 391–411 (2019) Ito, G., Hosoyamada, A., Matsumoto, R., Sasaki, Y., Iwata, T.: Quantum chosen-ciphertext attacks against Feistel ciphers. In: RSA 2019, pp. 391–411 (2019)
19.
Zurück zum Zitat Santoli, T., Schaffner, C.: Using Simon’s algorithm to attack symmetric-key cryptographic primitives. Quantum Inf. Comput. 17(1 & 2), 65–78 (2017)MathSciNet Santoli, T., Schaffner, C.: Using Simon’s algorithm to attack symmetric-key cryptographic primitives. Quantum Inf. Comput. 17(1 & 2), 65–78 (2017)MathSciNet
20.
Zurück zum Zitat Shi, T., Jin, C., Guan, J.: Collision attacks against AEZ-PRF for authenticated encryption AEZ. China Commun. 15(2), 46–53 (2018)CrossRef Shi, T., Jin, C., Guan, J.: Collision attacks against AEZ-PRF for authenticated encryption AEZ. China Commun. 15(2), 46–53 (2018)CrossRef
24.
Zurück zum Zitat Hosoyamada, A., Aoki, K.: On quantum related-key attacks on iterated Even–Mansour ciphers. In: 12th International Workshop on Security, pp. 3–18 (2017) Hosoyamada, A., Aoki, K.: On quantum related-key attacks on iterated Even–Mansour ciphers. In: 12th International Workshop on Security, pp. 3–18 (2017)
25.
Zurück zum Zitat Leander, G., May, A.: Grover meets Simon-quantumly attacking the FX-construction. In: ASIACRYPT 2017, pp. 161–178 (2017) Leander, G., May, A.: Grover meets Simon-quantumly attacking the FX-construction. In: ASIACRYPT 2017, pp. 161–178 (2017)
26.
Zurück zum Zitat Dong, X., Wang, X.: Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61, 102501 (2018)CrossRef Dong, X., Wang, X.: Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61, 102501 (2018)CrossRef
27.
Zurück zum Zitat Dong, X., Li, Z., Wang, X.: Quantum cryptanalysis on some generalized Feistel schemes. Sci. China Inf. Sci. 62, 22501 (2019)MathSciNetCrossRef Dong, X., Li, Z., Wang, X.: Quantum cryptanalysis on some generalized Feistel schemes. Sci. China Inf. Sci. 62, 22501 (2019)MathSciNetCrossRef
31.
Zurück zum Zitat Matsui, M.: New block encryption algorithm MISTY. In: FSE 1997, pp. 54–68 (1997) Matsui, M.: New block encryption algorithm MISTY. In: FSE 1997, pp. 54–68 (1997)
32.
Zurück zum Zitat Zheng, Y., Matsumoto, T., Imai, H.: On the construction of block ciphers provably secure and not relying on any unproved hypotheses. In: CRYPTO 1989, pp. 461–480 (1989) Zheng, Y., Matsumoto, T., Imai, H.: On the construction of block ciphers provably secure and not relying on any unproved hypotheses. In: CRYPTO 1989, pp. 461–480 (1989)
34.
Zurück zum Zitat Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (Extended abstract). In: FSE 2007, pp. 181–195 (2007) Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (Extended abstract). In: FSE 2007, pp. 181–195 (2007)
38.
Zurück zum Zitat Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)MATH Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)MATH
41.
Zurück zum Zitat Brassard, G., Høyer, P., Mosca, M.: Quantum amplitude amplification and estimation. Quantum computation and information: a millennium volume. Contemp. Math. 305, 53–74 (2002)CrossRef Brassard, G., Høyer, P., Mosca, M.: Quantum amplitude amplification and estimation. Quantum computation and information: a millennium volume. Contemp. Math. 305, 53–74 (2002)CrossRef
42.
Zurück zum Zitat Fuller, L.E.: Basic Matrix Theory. Courier Dover Publications, Mineola (2017)MATH Fuller, L.E.: Basic Matrix Theory. Courier Dover Publications, Mineola (2017)MATH
43.
Zurück zum Zitat Murphy, S., Robshaw, M.J.B.: Key-dependent S-boxes and differential cryptanalysis. Des. Codes Crypt. 27(3), 229–255 (2002)MathSciNetCrossRef Murphy, S., Robshaw, M.J.B.: Key-dependent S-boxes and differential cryptanalysis. Des. Codes Crypt. 27(3), 229–255 (2002)MathSciNetCrossRef
44.
Zurück zum Zitat Daemen, J., Rijmen, V.: Probability distributions of correlation and differentials in block ciphers. J. Math. Crypt. 1(3), 221–242 (2007)MathSciNetMATH Daemen, J., Rijmen, V.: Probability distributions of correlation and differentials in block ciphers. J. Math. Crypt. 1(3), 221–242 (2007)MathSciNetMATH
45.
Zurück zum Zitat Shi, T.R., Jin, C.H., Hu, B., et al.: Complete analysis of Simon’s quantum algorithm with additional collisions. Quantum Inf. Process. 18(11), 334 (2019)ADSMathSciNetCrossRef Shi, T.R., Jin, C.H., Hu, B., et al.: Complete analysis of Simon’s quantum algorithm with additional collisions. Quantum Inf. Process. 18(11), 334 (2019)ADSMathSciNetCrossRef
46.
Zurück zum Zitat Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373–386 (1988)MathSciNetCrossRef Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373–386 (1988)MathSciNetCrossRef
47.
Zurück zum Zitat Treger, J., Patarin, J.: Generic attacks on Feistel networks with internal permutations. In: AFRICACRYPT 2009, pp. 41–59 (2009) Treger, J., Patarin, J.: Generic attacks on Feistel networks with internal permutations. In: AFRICACRYPT 2009, pp. 41–59 (2009)
48.
Zurück zum Zitat Gilbert, H., Minier, M.: New results on the pseudorandomness of some blockcipher constructions. In; FSE 2001, pp. 248–266 (2001) Gilbert, H., Minier, M.: New results on the pseudorandomness of some blockcipher constructions. In; FSE 2001, pp. 248–266 (2001)
49.
Zurück zum Zitat Moriai, S., Vaudenay, S.: On the pseudorandomness of top-level schemes of block ciphers. In: ASIACRYPT 2000, pp. 289–302 (2000) Moriai, S., Vaudenay, S.: On the pseudorandomness of top-level schemes of block ciphers. In: ASIACRYPT 2000, pp. 289–302 (2000)
50.
Zurück zum Zitat Zhang, L.T., Wu, W.L.: Pseudorandomness and super pseudorandomness on the unbalanced feistel networks with contracting functions. Chin. J. Comput. 32(7), 1320–1330 (2009)MathSciNetCrossRef Zhang, L.T., Wu, W.L.: Pseudorandomness and super pseudorandomness on the unbalanced feistel networks with contracting functions. Chin. J. Comput. 32(7), 1320–1330 (2009)MathSciNetCrossRef
51.
Zurück zum Zitat Wu, W.L., Wei, H.R.: Pseudorandomness on the round-structure of Skipjack. Chin. Inst. Electron. 15(3), 378–383 (2006) Wu, W.L., Wei, H.R.: Pseudorandomness on the round-structure of Skipjack. Chin. Inst. Electron. 15(3), 378–383 (2006)
Metadaten
Titel
Applications of Simon’s algorithm in quantum attacks on Feistel variants
verfasst von
Jingyi Cui
Jiansheng Guo
Shuzhen Ding
Publikationsdatum
01.03.2021
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 3/2021
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-021-03027-x

Weitere Artikel der Ausgabe 3/2021

Quantum Information Processing 3/2021 Zur Ausgabe

Neuer Inhalt