Quantum-enhanced symmetric cryptanalysis for S-AES
- URL: http://arxiv.org/abs/2304.05380v1
- Date: Tue, 11 Apr 2023 17:46:44 GMT
- Title: Quantum-enhanced symmetric cryptanalysis for S-AES
- Authors: Alexey Moiseevskiy
- Abstract summary: We present an algorithm for optimized Grover's attack on downscaled Simplifed-AES cipher.
For 16-bit S-AES the proposed attack requires 23 qubits in general case and 19, 15 or 11 if 4, 8 or 12 bits were leaked in confguration.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Advanced Encryption Standard is one of the most widely used and important
symmetric ciphers for today. It well known, that it can be subjected to the
quantum Grover's attack that twice reduces its key strength. But full AES
attack requires hundreds of qubits and circuit depth of thousands, that makes
impossible not only experimental research but also numerical simulations of
this algorithm. Here we present an algorithm for optimized Grover's attack on
downscaled Simplifed-AES cipher. Besides full attack we present several
approaches that allows to reduce number of required qubits if some nibbles of
the key are known as a result of side-channel attack. For 16-bit S-AES the
proposed attack requires 23 qubits in general case and 19, 15 or 11 if 4, 8 or
12 bits were leaked in specifc confguration. Comparing to previously known
32-qubits algorithm this approach potentially allows to run the attack on
today's NISQ-devices and perform numerical simulations with GPU, that may be
useful for further research of problem-specifc error mitigation and error
correction techniques.
Related papers
- On the practicality of quantum sieving algorithms for the shortest vector problem [42.70026220176376]
lattice-based cryptography is one of the main candidates of post-quantum cryptography.
cryptographic security against quantum attackers is based on lattice problems like the shortest vector problem (SVP)
Asymptotic quantum speedups for solving SVP are known and rely on Grover's search.
arXiv Detail & Related papers (2024-10-17T16:54:41Z) - Hacking Cryptographic Protocols with Advanced Variational Quantum
Attacks [0.0]
We implement simulations of our attacks for symmetric-key protocols such as S-DES, S-AES and Blowfish.
We show how our attack allows a classical simulation of a small 8-qubit quantum computer to find the secret key of one 32-bit Blowfish instance with 24 times fewer number of iterations than a brute-force attack.
Further applications beyond symmetric-key cryptography are also discussed, including asymmetric-key protocols and hash functions.
arXiv Detail & Related papers (2023-11-06T09:46:16Z) - Versatile Weight Attack via Flipping Limited Bits [68.45224286690932]
We study a novel attack paradigm, which modifies model parameters in the deployment stage.
Considering the effectiveness and stealthiness goals, we provide a general formulation to perform the bit-flip based weight attack.
We present two cases of the general formulation with different malicious purposes, i.e., single sample attack (SSA) and triggered samples attack (TSA)
arXiv Detail & Related papers (2022-07-25T03:24:58Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - Sparse and Imperceptible Adversarial Attack via a Homotopy Algorithm [93.80082636284922]
Sparse adversarial attacks can fool deep networks (DNNs) by only perturbing a few pixels.
Recent efforts combine it with another l_infty perturbation on magnitudes.
We propose a homotopy algorithm to tackle the sparsity and neural perturbation framework.
arXiv Detail & Related papers (2021-06-10T20:11:36Z) - Recovering AES Keys with a Deep Cold Boot Attack [91.22679787578438]
Cold boot attacks inspect the corrupted random access memory soon after the power has been shut down.
In this work, we combine a novel cryptographic variant of a deep error correcting code technique with a modified SAT solver scheme to apply the attack on AES keys.
Our results show that our methods outperform the state of the art attack methods by a very large margin.
arXiv Detail & Related papers (2021-06-09T07:57:01Z) - Targeted Attack against Deep Neural Networks via Flipping Limited Weight
Bits [55.740716446995805]
We study a novel attack paradigm, which modifies model parameters in the deployment stage for malicious purposes.
Our goal is to misclassify a specific sample into a target class without any sample modification.
By utilizing the latest technique in integer programming, we equivalently reformulate this BIP problem as a continuous optimization problem.
arXiv Detail & Related papers (2021-02-21T03:13:27Z) - Quantum Key Recovery Attack on SIMON Block Cipher [11.112331561801605]
We study quantum key recovery attack on SIMON block cipher using Quantum Amplitude Amplification algorithm in Q1 model.
We take the quantum attack on 19-round SIMON32/64 for an example and design the quantum circuit of the key recovery process.
arXiv Detail & Related papers (2020-12-12T02:15:47Z) - Composite Adversarial Attacks [57.293211764569996]
Adversarial attack is a technique for deceiving Machine Learning (ML) models.
In this paper, a new procedure called Composite Adrial Attack (CAA) is proposed for automatically searching the best combination of attack algorithms.
CAA beats 10 top attackers on 11 diverse defenses with less elapsed time.
arXiv Detail & Related papers (2020-12-10T03:21:16Z) - Quantum Period Finding against Symmetric Primitives in Practice [3.04585143845864]
We present the first complete implementation of the offline Simon's algorithm, and estimate its cost to attack the Chaskey, the block cipher PRINCE and the NIST lightweight candidate AEAD scheme Elephant.
These attacks require a reasonable amount of qubits, comparable to the number of qubits required to break RSA-2048.
We stress that our attacks could be applied in the future against today's communications, and recommend caution when choosing symmetric constructions for cases where long-term security is expected.
arXiv Detail & Related papers (2020-11-13T17:12:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.