Skip to main content
Erschienen in: Quantum Information Processing 4/2021

01.04.2021

Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms

verfasst von: Yinsong Xu, Wenjie Liu, Wenbin Yu

Erschienen in: Quantum Information Processing | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The classic forgery attacks on COPA, AES-COPA and Marble authenticated encryption algorithms need to query about \({2^{n/2}}\) times, and their success probability is not high. To solve this problem, the corresponding quantum forgery attacks on COPA, AES-COPA and Marble authenticated encryption algorithms are presented. In the quantum forgery attacks on COPA and AES-COPA, we use Simon’s algorithm to find the period of the tag generation function in COPA and AES-COPA by querying in superposition, and then generate a forged tag for a new message. In the quantum forgery attack on Marble, Simon’s algorithm is used to recover the secret parameter L, and the forged tag can be computed with L. Compared with classic forgery attacks on COPA, AES-COPA and Marble, our attack can reduce the number of queries from \(O({2^{n/2}})\) to O(n) and improve success probability close to 100%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lu, J.: On the security of the LAC authenticated encryption algorithm. In: Proceedings of Australasian Conference on Information Security and Privacy, ACISP 2016, pp. 395–408 (2016) Lu, J.: On the security of the LAC authenticated encryption algorithm. In: Proceedings of Australasian Conference on Information Security and Privacy, ACISP 2016, pp. 395–408 (2016)
3.
Zurück zum Zitat Boer, G.J., McFarlane, N.A.: The AES atmospheric general circulation model. GARP Publ. Ser. 22, 409–460 (1979) Boer, G.J., McFarlane, N.A.: The AES atmospheric general circulation model. GARP Publ. Ser. 22, 409–460 (1979)
4.
Zurück zum Zitat Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Tischhauser, E., Yasuda, K.: Parallelizable and authenticated online ciphers. Proc. Adv. Cryptol. ASIACRYPT 2013, 424–443 (2013)MathSciNetMATH Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Tischhauser, E., Yasuda, K.: Parallelizable and authenticated online ciphers. Proc. Adv. Cryptol. ASIACRYPT 2013, 424–443 (2013)MathSciNetMATH
5.
Zurück zum Zitat National Institute of Standards and Technology (NIST): Advanced Encryption Standard (AES), FIPS-197 (2001) National Institute of Standards and Technology (NIST): Advanced Encryption Standard (AES), FIPS-197 (2001)
11.
Zurück zum Zitat Nandi, M.: Revisiting security claims of XLS and COPA. In: IACR Cryptology ePrint Archive, vol. 444 (2015) Nandi, M.: Revisiting security claims of XLS and COPA. In: IACR Cryptology ePrint Archive, vol. 444 (2015)
12.
Zurück zum Zitat Lu, J.: Almost universal forgery attacks on the COPA and marble authenticated encryption algorithms. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 789–799 (2017) Lu, J.: Almost universal forgery attacks on the COPA and marble authenticated encryption algorithms. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 789–799 (2017)
13.
Zurück zum Zitat Dunkelman, O., Keller, N., Shamir, A.: Almost universal forgery attacks on AES-based MAC’s. Des. Codes Crypt. 76(3), 431–449 (2015)MathSciNetCrossRefMATH Dunkelman, O., Keller, N., Shamir, A.: Almost universal forgery attacks on AES-based MAC’s. Des. Codes Crypt. 76(3), 431–449 (2015)MathSciNetCrossRefMATH
14.
Zurück zum Zitat Fuhr, T., Leurent, G., Suder, V.: Collision attacks against CAESAR candidates. Proc. Adv. Cryptol. ASIACRYPT 2015, 510–532 (2015)MATH Fuhr, T., Leurent, G., Suder, V.: Collision attacks against CAESAR candidates. Proc. Adv. Cryptol. ASIACRYPT 2015, 510–532 (2015)MATH
15.
Zurück zum Zitat Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of 35th Annual Symposium on Foundations of Computer Science, pp. 124–134 (1997) Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of 35th Annual Symposium on Foundations of Computer Science, pp. 124–134 (1997)
16.
Zurück zum Zitat Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: Proceedings of the 2010 IEEE International Symposium on Information Theory, pp. 13–18 (2010) Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: Proceedings of the 2010 IEEE International Symposium on Information Theory, pp. 13–18 (2010)
17.
Zurück zum Zitat Kuwakado, H., Morii, M.: Security on the quantum-type even-mansour cipher. In: Proceedings of the 2012 International Symposium on Information Theory and its Applications, pp. 28–31 (2012) Kuwakado, H., Morii, M.: Security on the quantum-type even-mansour cipher. In: Proceedings of the 2012 International Symposium on Information Theory and its Applications, pp. 28–31 (2012)
18.
19.
Zurück zum Zitat Biamonte, J., Wittek, P., Pancotti, N., Rebentrost, P., Wiebe, N., Lloyd, S.: Quantum machine learning. Nature 549, 195–202 (2017)ADSCrossRef Biamonte, J., Wittek, P., Pancotti, N., Rebentrost, P., Wiebe, N., Lloyd, S.: Quantum machine learning. Nature 549, 195–202 (2017)ADSCrossRef
20.
Zurück zum Zitat Liu, W., Chen, J., Wang, Y., Gao, P., Lei, Z.: Quantum-based feature selection for multiclassification problem in complex systems with edge computing. Complexity 2020, 8216874 (2020)MATH Liu, W., Chen, J., Wang, Y., Gao, P., Lei, Z.: Quantum-based feature selection for multiclassification problem in complex systems with edge computing. Complexity 2020, 8216874 (2020)MATH
21.
Zurück zum Zitat Gao, Y.-L., Chen, X.-B., Xu, G., Yuan, K.-G., Liu, W., Yang, Y.-X.: A novel quantum blockchain scheme base on quantum entanglement and DPoS. Quantum Inf. Process. 19, 420 (2020)ADSMathSciNetCrossRef Gao, Y.-L., Chen, X.-B., Xu, G., Yuan, K.-G., Liu, W., Yang, Y.-X.: A novel quantum blockchain scheme base on quantum entanglement and DPoS. Quantum Inf. Process. 19, 420 (2020)ADSMathSciNetCrossRef
22.
Zurück zum Zitat Banerjee, S., Mukherjee, A., Panigrahi, P.K.: Quantum blockchain using weighted hypergraph states. Phys. Rev. Res. 2(1), 013322 (2020)CrossRef Banerjee, S., Mukherjee, A., Panigrahi, P.K.: Quantum blockchain using weighted hypergraph states. Phys. Rev. Res. 2(1), 013322 (2020)CrossRef
24.
Zurück zum Zitat Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Proceedings of the Advances in Cryptology-CRYPTO 2016, pp. 207–237 (2016) Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Proceedings of the Advances in Cryptology-CRYPTO 2016, pp. 207–237 (2016)
25.
Zurück zum Zitat Shi, T., Jin, C., Guan, J.: Collision attacks against AEZ-PRF for authenticated encryption AEZ. China Commun. 15(2), 46–53 (2018)CrossRef Shi, T., Jin, C., Guan, J.: Collision attacks against AEZ-PRF for authenticated encryption AEZ. China Commun. 15(2), 46–53 (2018)CrossRef
26.
Zurück zum Zitat Grover, L.K.: Quantum computers can search arbitrarily large databases by a single query. Phys. Rev. Lett. 79(23), 4709–4712 (1997)ADSCrossRef Grover, L.K.: Quantum computers can search arbitrarily large databases by a single query. Phys. Rev. Lett. 79(23), 4709–4712 (1997)ADSCrossRef
27.
Zurück zum Zitat Leander, G. May, A.: Grover meets Simon—quantumly attacking the FX-construction. In: Proceedings of Advances in Cryptology-ASIACRYPT 2017, pp. 161–178 (2017) Leander, G. May, A.: Grover meets Simon—quantumly attacking the FX-construction. In: Proceedings of Advances in Cryptology-ASIACRYPT 2017, pp. 161–178 (2017)
29.
30.
Zurück zum Zitat Chailloux, A., Naya-Plasencia, M., Schrottenloher, A.: An efficient quantum collision search algorithm and implications on symmetric cryptography. Proc. Adv. Cryptol. ASIACRYPT 2017, 211–240 (2017)MathSciNetMATH Chailloux, A., Naya-Plasencia, M., Schrottenloher, A.: An efficient quantum collision search algorithm and implications on symmetric cryptography. Proc. Adv. Cryptol. ASIACRYPT 2017, 211–240 (2017)MathSciNetMATH
31.
Zurück zum Zitat Hosoyamada, A., Sasaki, Y., Xagawa, K.: Quantum multicollision-finding algorithm. Proc. Adv. Cryptol. ASIACRYPT 2017, 179–210 (2017)MathSciNetMATH Hosoyamada, A., Sasaki, Y., Xagawa, K.: Quantum multicollision-finding algorithm. Proc. Adv. Cryptol. ASIACRYPT 2017, 179–210 (2017)MathSciNetMATH
32.
Zurück zum Zitat Hosoyamada, A., Sasaki, Y., Tani, S., Xagawa, K.: Improved quantum multicollision-finding algorithm. Proc. Postquantum Cryptogr. 2019, 350–367 (2019)MathSciNetMATH Hosoyamada, A., Sasaki, Y., Tani, S., Xagawa, K.: Improved quantum multicollision-finding algorithm. Proc. Postquantum Cryptogr. 2019, 350–367 (2019)MathSciNetMATH
33.
Zurück zum Zitat Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: On quantum slide attacks. Proc. Sel. Areas Cryptogr. SAC 2019, 492–519 (2019)MATH Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: On quantum slide attacks. Proc. Sel. Areas Cryptogr. SAC 2019, 492–519 (2019)MATH
34.
Zurück zum Zitat Hosoyamada, A., Sasaki, Y.: Quantum Demiric-Selcuk meet-in-the-middle attacks: applications to 6-round generic feistel constructions. In: Proceedings of Security and Cryptography for Networks, pp. 386–403 (2018) Hosoyamada, A., Sasaki, Y.: Quantum Demiric-Selcuk meet-in-the-middle attacks: applications to 6-round generic feistel constructions. In: Proceedings of Security and Cryptography for Networks, pp. 386–403 (2018)
35.
Zurück zum Zitat Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Quantum Differential and Linear Cryptanalysis. arXiv:1510.05836 (2015) Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Quantum Differential and Linear Cryptanalysis. arXiv:1510.05836 (2015)
36.
Zurück zum Zitat Shi, T.R., Jin, C.H., Hu, B., Guan, J., Cui, J.Y., Wang, S.P.: Complete analysis of Simon’s quantum algorithm with additional collisions. Quantum Inf. Process. 18(11), 334 (2019)ADSMathSciNetCrossRef Shi, T.R., Jin, C.H., Hu, B., Guan, J., Cui, J.Y., Wang, S.P.: Complete analysis of Simon’s quantum algorithm with additional collisions. Quantum Inf. Process. 18(11), 334 (2019)ADSMathSciNetCrossRef
Metadaten
Titel
Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms
verfasst von
Yinsong Xu
Wenjie Liu
Wenbin Yu
Publikationsdatum
01.04.2021
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 4/2021
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-021-03036-w

Weitere Artikel der Ausgabe 4/2021

Quantum Information Processing 4/2021 Zur Ausgabe

Neuer Inhalt