Quantum Attacks without Superposition Queries: the Offline Simon's
Algorithm
- URL: http://arxiv.org/abs/2002.12439v1
- Date: Thu, 27 Feb 2020 21:05:54 GMT
- Title: Quantum Attacks without Superposition Queries: the Offline Simon's
Algorithm
- Authors: Xavier Bonnetain, Akinori Hosoyamada, Mar\'ia Naya-Plasencia, Yu
Sasaki, and Andr\'e Schrottenloher
- Abstract summary: We introduce a new quantum algorithm which uses Simon's subroutines in a novel way.
We obtain improved quantum-time/classical-data tradeoffs with respect to the current literature.
We improve some previous superposition attacks by reducing the data complexity.
- Score: 7.819565615098435
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In symmetric cryptanalysis, the model of superposition queries has led to
surprising results, with many constructions being broken in polynomial time
thanks to Simon's period-finding algorithm. But the practical implications of
these attacks remain blurry. In contrast, the results obtained so far for a
quantum adversary making classical queries only are less impressive. In this
paper, we introduce a new quantum algorithm which uses Simon's subroutines in a
novel way. We manage to leverage the algebraic structure of cryptosystems in
the context of a quantum attacker limited to classical queries and offline
quantum computations. We obtain improved quantum-time/classical-data tradeoffs
with respect to the current literature, while using only as much hardware
requirements (quantum and classical) as a standard exhaustive search with
Grover's algorithm. In particular, we are able to break the Even-Mansour
construction in quantum time $\tilde{O}(2^{n/3})$, with $O(2^{n/3})$ classical
queries and $O(n^2)$ qubits only. In addition, we improve some previous
superposition attacks by reducing the data complexity from exponential to
polynomial, with the same time complexity. Our approach can be seen in two
complementary ways: \emph{reusing} superposition queries during the iteration
of a search using Grover's algorithm, or alternatively, removing the memory
requirement in some quantum attacks based on a collision search, thanks to
their algebraic structure. We provide a list of cryptographic applications,
including the Even-Mansour construction, the FX construction, some Sponge
authenticated modes of encryption, and many more.
Related papers
- Founding Quantum Cryptography on Quantum Advantage, or, Towards Cryptography from $\mathsf{\#P}$-Hardness [10.438299411521099]
Recent separations have raised the tantalizing possibility of building quantum cryptography from sources of hardness that persist even if hierarchy collapses.
We show that quantum cryptography can be based on the extremely mild assumption that $mathsfP#P notsubseteq mathsf(io)BQP/qpoly$.
arXiv Detail & Related papers (2024-09-23T17:45:33Z) - Quantum One-Wayness of the Single-Round Sponge with Invertible Permutations [49.1574468325115]
Sponge hashing is a widely used class of cryptographic hash algorithms.
Intrepid permutations have so far remained a fundamental open problem.
We show that finding zero-pairs in a random $2n$-bit permutation requires at least $Omega (2n/2)$ many queries.
arXiv Detail & Related papers (2024-03-07T18:46:58Z) - Grover's oracle for the Shortest Vector Problem and its application in
hybrid classical-quantum solvers [0.38366697175402226]
Finding the shortest vector in a lattice is a problem that is believed to be hard both for classical and quantum computers.
Finding the best classical, quantum or hybrid classical-quantum algorithms for SVP is necessary to select cryptosystem parameters that offer sufficient level of security.
Grover's search quantum algorithm provides a generic quadratic speed-up.
We analyze how to combine Grover's quantum search for small SVP instances with state-of-the-art classical solvers.
arXiv Detail & Related papers (2024-02-21T16:05:49Z) - Quantum Worst-Case to Average-Case Reductions for All Linear Problems [66.65497337069792]
We study the problem of designing worst-case to average-case reductions for quantum algorithms.
We provide an explicit and efficient transformation of quantum algorithms that are only correct on a small fraction of their inputs into ones that are correct on all inputs.
arXiv Detail & Related papers (2022-12-06T22:01:49Z) - The NISQ Complexity of Collision Finding [2.9405711598281536]
A fundamental primitive in modern cryptography, collision-resistant hashing ensures there is no efficient way to find inputs that produce the same hash value.
Quantum adversaries now require full-scale computers equipped with the power of NISQ.
In this paper, we investigate three different models for NISQ algorithms achieve tight bounds for all of them.
arXiv Detail & Related papers (2022-11-23T13:55:28Z) - Quantum Depth in the Random Oracle Model [57.663890114335736]
We give a comprehensive characterization of the computational power of shallow quantum circuits combined with classical computation.
For some problems, the ability to perform adaptive measurements in a single shallow quantum circuit is more useful than the ability to perform many shallow quantum circuits without adaptive measurements.
arXiv Detail & Related papers (2022-10-12T17:54:02Z) - Entanglement and coherence in Bernstein-Vazirani algorithm [58.720142291102135]
Bernstein-Vazirani algorithm allows one to determine a bit string encoded into an oracle.
We analyze in detail the quantum resources in the Bernstein-Vazirani algorithm.
We show that in the absence of entanglement, the performance of the algorithm is directly related to the amount of quantum coherence in the initial state.
arXiv Detail & Related papers (2022-05-26T20:32:36Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - Depth-efficient proofs of quantumness [77.34726150561087]
A proof of quantumness is a type of challenge-response protocol in which a classical verifier can efficiently certify quantum advantage of an untrusted prover.
In this paper, we give two proof of quantumness constructions in which the prover need only perform constant-depth quantum circuits.
arXiv Detail & Related papers (2021-07-05T17:45:41Z) - Hardware Efficient Quantum Search Algorithm [17.74233101199813]
We propose a novel hardware efficient quantum search algorithm to overcome this challenge.
Our key idea is to replace the global diffusion operation with low-cost local diffusions.
The circuit cost reduction leads to a remarkable improvement in the system success rates.
arXiv Detail & Related papers (2021-03-26T01:08:50Z) - On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs
of Sequential Work [10.43571631715192]
We revisit the so-called compressed oracle technique, introduced by Zhandry for analyzing quantum algorithms in the quantum random oracle model (QROM)
Our main technical contribution is a framework that simplifies the use of the parallel-query generalization of the compressed oracle technique for proving query complexity results.
As a concrete cryptographic application of our techniques, we prove that the "Simple Proofs of Sequential Work" proposed by Cohen and Pietrzak remains secure against quantum attacks.
arXiv Detail & Related papers (2020-10-22T12:44:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.