Quantum Period Finding against Symmetric Primitives in Practice
- URL: http://arxiv.org/abs/2011.07022v1
- Date: Fri, 13 Nov 2020 17:12:49 GMT
- Title: Quantum Period Finding against Symmetric Primitives in Practice
- Authors: Xavier Bonnetain and Samuel Jaques
- Abstract summary: We present the first complete implementation of the offline Simon's algorithm, and estimate its cost to attack the Chaskey, the block cipher PRINCE and the NIST lightweight candidate AEAD scheme Elephant.
These attacks require a reasonable amount of qubits, comparable to the number of qubits required to break RSA-2048.
We stress that our attacks could be applied in the future against today's communications, and recommend caution when choosing symmetric constructions for cases where long-term security is expected.
- Score: 3.04585143845864
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We present the first complete implementation of the offline Simon's
algorithm, and estimate its cost to attack the MAC Chaskey, the block cipher
PRINCE and the NIST lightweight candidate AEAD scheme Elephant.
These attacks require a reasonable amount of qubits, comparable to the number
of qubits required to break RSA-2048. They are faster than other collision
algorithms, and the attacks against PRINCE and Chaskey are the most efficient
known to date. As Elephant has a key smaller than its state size, the algorithm
is less efficient and ends up more expensive than exhaustive search.
We also propose an optimized quantum circuit for boolean linear algebra as
well as complete reversible implementations of PRINCE, Chaskey, spongent and
Keccak which are of independent interest for quantum cryptanalysis.
We stress that our attacks could be applied in the future against today's
communications, and recommend caution when choosing symmetric constructions for
cases where long-term security is expected.
Related papers
- Hacking Cryptographic Protocols with Tensor Network Attacks [0.0]
We introduce the application of Networks (TN) to launch attacks on symmetric-key cryptography.
Our approaches make use of Matrix Product States (MPS) as well as our recently-introduced Flexible-PEPS Quantum Circuit Simulator (FQCS)
For small key size, MPS outperforms VQAA and FQCS in both time and average iterations required to recover the key.
arXiv Detail & Related papers (2024-09-06T08:51:31Z) - Sum-of-Squares inspired Quantum Metaheuristic for Polynomial Optimization with the Hadamard Test and Approximate Amplitude Constraints [76.53316706600717]
Recently proposed quantum algorithm arXiv:2206.14999 is based on semidefinite programming (SDP)
We generalize the SDP-inspired quantum algorithm to sum-of-squares.
Our results show that our algorithm is suitable for large problems and approximate the best known classicals.
arXiv Detail & Related papers (2024-08-14T19:04:13Z) - Implementation of Entropically Secure Encryption: Securing Personal Health Data [0.704590071265998]
Entropically Secure Encryption (ESE) offers unconditional security with shorter keys to the One-Time Pad.
We present the first implementation of ESE for bulk encryption.
arXiv Detail & Related papers (2024-04-04T12:07:33Z) - Hacking Cryptographic Protocols with Advanced Variational Quantum
Attacks [0.0]
We implement simulations of our attacks for symmetric-key protocols such as S-DES, S-AES and Blowfish.
We show how our attack allows a classical simulation of a small 8-qubit quantum computer to find the secret key of one 32-bit Blowfish instance with 24 times fewer number of iterations than a brute-force attack.
Further applications beyond symmetric-key cryptography are also discussed, including asymmetric-key protocols and hash functions.
arXiv Detail & Related papers (2023-11-06T09:46:16Z) - Quantum-enhanced symmetric cryptanalysis for S-AES [0.0]
We present an algorithm for optimized Grover's attack on downscaled Simplifed-AES cipher.
For 16-bit S-AES the proposed attack requires 23 qubits in general case and 19, 15 or 11 if 4, 8 or 12 bits were leaked in confguration.
arXiv Detail & Related papers (2023-04-11T17:46:44Z) - Quantum Goemans-Williamson Algorithm with the Hadamard Test and
Approximate Amplitude Constraints [62.72309460291971]
We introduce a variational quantum algorithm for Goemans-Williamson algorithm that uses only $n+1$ qubits.
Efficient optimization is achieved by encoding the objective matrix as a properly parameterized unitary conditioned on an auxilary qubit.
We demonstrate the effectiveness of our protocol by devising an efficient quantum implementation of the Goemans-Williamson algorithm for various NP-hard problems.
arXiv Detail & Related papers (2022-06-30T03:15:23Z) - Entanglement and coherence in Bernstein-Vazirani algorithm [58.720142291102135]
Bernstein-Vazirani algorithm allows one to determine a bit string encoded into an oracle.
We analyze in detail the quantum resources in the Bernstein-Vazirani algorithm.
We show that in the absence of entanglement, the performance of the algorithm is directly related to the amount of quantum coherence in the initial state.
arXiv Detail & Related papers (2022-05-26T20:32:36Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - Revisiting and Advancing Fast Adversarial Training Through The Lens of
Bi-Level Optimization [60.72410937614299]
We propose a new tractable bi-level optimization problem, design and analyze a new set of algorithms termed Bi-level AT (FAST-BAT)
FAST-BAT is capable of defending sign-based projected descent (PGD) attacks without calling any gradient sign method and explicit robust regularization.
arXiv Detail & Related papers (2021-12-23T06:25:36Z) - Beyond quadratic speedups in quantum attacks on symmetric schemes [30.01567358439495]
We report the first quantum key-recovery attack on a symmetric block cipher design, using classical queries only.
Our attack shows that the structure of some symmetric constructions can be exploited to overcome this limit.
arXiv Detail & Related papers (2021-10-06T15:10:31Z) - Optimistic Exploration even with a Pessimistic Initialisation [57.41327865257504]
Optimistic initialisation is an effective strategy for efficient exploration in reinforcement learning (RL)
In particular, in scenarios with only positive rewards, Q-values are initialised at their lowest possible values.
We propose a simple count-based augmentation to pessimistically initialised Q-values that separates the source of optimism from the neural network.
arXiv Detail & Related papers (2020-02-26T17:15:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.