Quantum Key Recovery Attack on SIMON Block Cipher
- URL: http://arxiv.org/abs/2012.08321v2
- Date: Wed, 2 Jun 2021 11:03:06 GMT
- Title: Quantum Key Recovery Attack on SIMON Block Cipher
- Authors: Hui Liu, Li Yang
- Abstract summary: We study quantum key recovery attack on SIMON block cipher using Quantum Amplitude Amplification algorithm in Q1 model.
We take the quantum attack on 19-round SIMON32/64 for an example and design the quantum circuit of the key recovery process.
- Score: 11.112331561801605
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The quantum security of lightweight block ciphers is receiving more and more
attention. However, the existing quantum attacks on lightweight block ciphers
mainly focused on the quantum exhaustive search, while the quantum dedicated
attacks combined with classical cryptanalysis methods haven't been well
studied. In this paper, we study quantum key recovery attack on SIMON block
cipher using Quantum Amplitude Amplification algorithm in Q1 model. At first,
we reanalyze the quantum circuit complexity of quantum master key exhaustive
search on SIMON block cipher. The Clifford gates count is estimated more
accurately and the T gate count is reduced. We also reduce the T-depth and
Full-depth due to some minor modifications to the circuit. Then, based on the
differential cryptanalysis on SIMON32, SIMON48 and SIMON64 given by Biryukov et
al. in FSE 2014, we give quantum round key recovery attacks on these SIMON
variants and analyze quantum circuit complexity separately. We take the quantum
attack on 19-round SIMON32/64 for an example and design the quantum circuit of
the key recovery process. The two phases of this attack could be regarded as
two QAA instances separately, and the first QAA instance consists of four
sub-QAA instances. We conclude that the encryption complexity and circuit
complexity of quantum dedicated attacks on 19-round SIMON32/64, 19-round SIMON
48 and 26-round SIMON64/128 are both lower than those of the quantum exhaustive
search on these variants separately. Our work firstly studies the quantum
dedicated attack on SIMON block cipher from the perspective of quantum circuit
complexity, which is a more fine-grained analysis of quantum dedicated attacks'
complexity.
Related papers
- Quantum Truncated Differential and Boomerang Attack [10.853582091917236]
In this article, we concentrate on truncated differential and boomerang cryptanalysis.
We first present a quantum algorithm which is designed for finding truncated differentials of symmetric ciphers.
We prove that, with a overwhelming probability, the truncated differentials output by our algorithm must have high differential probability for the vast majority of keys in key space.
arXiv Detail & Related papers (2024-07-21T11:34:29Z) - QuantumSEA: In-Time Sparse Exploration for Noise Adaptive Quantum
Circuits [82.50620782471485]
QuantumSEA is an in-time sparse exploration for noise-adaptive quantum circuits.
It aims to achieve two key objectives: (1) implicit circuits capacity during training and (2) noise robustness.
Our method establishes state-of-the-art results with only half the number of quantum gates and 2x time saving of circuit executions.
arXiv Detail & Related papers (2024-01-10T22:33:00Z) - Quantum Query Lower Bounds for Key Recovery Attacks on the Even-Mansour
Cipher [0.0]
Even-Mansour (EM) cipher is one of the famous constructions for a block cipher.
Kuwakado and Morii demonstrated that a quantum adversary can recover its $n$-bit secret keys only with $O(n)$ nonadaptive quantum queries.
arXiv Detail & Related papers (2023-08-21T02:01:30Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - Depth-efficient proofs of quantumness [77.34726150561087]
A proof of quantumness is a type of challenge-response protocol in which a classical verifier can efficiently certify quantum advantage of an untrusted prover.
In this paper, we give two proof of quantumness constructions in which the prover need only perform constant-depth quantum circuits.
arXiv Detail & Related papers (2021-07-05T17:45:41Z) - Variational Quantum Cloning: Improving Practicality for Quantum
Cryptanalysis [2.064612766965483]
We propose variational quantum cloning (VQC), a machine learning based cryptanalysis algorithm.
VQC allows an adversary to obtain optimal (approximate) cloning strategies with short depth quantum circuits.
We derive attacks on two protocols as examples, based on quantum cloning and facilitated by VQC.
arXiv Detail & Related papers (2020-12-21T15:28:09Z) - Quantum Fully Homomorphic Encryption by Integrating Pauli One-time Pad
with Quaternions [4.182969308816531]
Quantum fully homomorphic encryption (QFHE) allows to evaluate quantum circuits on encrypted data.
We present a novel QFHE scheme, which extends Pauli one-time pad encryption by relying on the quaternion of SU(2).
arXiv Detail & Related papers (2020-12-08T04:54:02Z) - QUANTIFY: A framework for resource analysis and design verification of
quantum circuits [69.43216268165402]
QUANTIFY is an open-source framework for the quantitative analysis of quantum circuits.
It is based on Google Cirq and is developed with Clifford+T circuits in mind.
For benchmarking purposes QUANTIFY includes quantum memory and quantum arithmetic circuits.
arXiv Detail & Related papers (2020-07-21T15:36:25Z) - Post-Quantum Multi-Party Computation [32.75732860329838]
We study multi-party computation for classical functionalities (in the plain model) with security against malicious-time quantum adversaries.
We assume superpolynomial quantum hardness of learning with errors (LWE), and quantum hardness of an LWE-based circular security assumption.
Along the way, we develop cryptographic primitives that may be of independent interest.
arXiv Detail & Related papers (2020-05-23T00:42:52Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.