Hacking Cryptographic Protocols with Advanced Variational Quantum
Attacks
- URL: http://arxiv.org/abs/2311.02986v1
- Date: Mon, 6 Nov 2023 09:46:16 GMT
- Title: Hacking Cryptographic Protocols with Advanced Variational Quantum
Attacks
- Authors: Borja Aizpurua, Pablo Bermejo, Josu Etxezarreta Martinez, Roman Orus
- Abstract summary: We implement simulations of our attacks for symmetric-key protocols such as S-DES, S-AES and Blowfish.
We show how our attack allows a classical simulation of a small 8-qubit quantum computer to find the secret key of one 32-bit Blowfish instance with 24 times fewer number of iterations than a brute-force attack.
Further applications beyond symmetric-key cryptography are also discussed, including asymmetric-key protocols and hash functions.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Here we introduce an improved approach to Variational Quantum Attack
Algorithms (VQAA) on crytographic protocols. Our methods provide robust quantum
attacks to well-known cryptographic algorithms, more efficiently and with
remarkably fewer qubits than previous approaches. We implement simulations of
our attacks for symmetric-key protocols such as S-DES, S-AES and Blowfish. For
instance, we show how our attack allows a classical simulation of a small
8-qubit quantum computer to find the secret key of one 32-bit Blowfish instance
with 24 times fewer number of iterations than a brute-force attack. Our work
also shows improvements in attack success rates for lightweight ciphers such as
S-DES and S-AES. Further applications beyond symmetric-key cryptography are
also discussed, including asymmetric-key protocols and hash functions. In
addition, we also comment on potential future improvements of our methods. Our
results bring one step closer assessing the vulnerability of large-size
classical cryptographic protocols with Noisy Intermediate-Scale Quantum (NISQ)
devices, and set the stage for future research in quantum cybersecurity.
Related papers
- Variational protocols for emulating digital gates using analog control with always-on interactions [37.69303106863453]
We show that we can engineer layers of single-qubit and multi-qubit gates in neutral atom quantum simulators.
We discuss how the proposed method can be used to perform refocusing algorithms, SWAP networks, and ultimately quantum chemistry simulations.
arXiv Detail & Related papers (2024-02-12T13:51:26Z) - Quantum-enhanced symmetric cryptanalysis for S-AES [0.0]
We present an algorithm for optimized Grover's attack on downscaled Simplifed-AES cipher.
For 16-bit S-AES the proposed attack requires 23 qubits in general case and 19, 15 or 11 if 4, 8 or 12 bits were leaked in confguration.
arXiv Detail & Related papers (2023-04-11T17:46:44Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - Recovering AES Keys with a Deep Cold Boot Attack [91.22679787578438]
Cold boot attacks inspect the corrupted random access memory soon after the power has been shut down.
In this work, we combine a novel cryptographic variant of a deep error correcting code technique with a modified SAT solver scheme to apply the attack on AES keys.
Our results show that our methods outperform the state of the art attack methods by a very large margin.
arXiv Detail & Related papers (2021-06-09T07:57:01Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Variational Quantum Cloning: Improving Practicality for Quantum
Cryptanalysis [2.064612766965483]
We propose variational quantum cloning (VQC), a machine learning based cryptanalysis algorithm.
VQC allows an adversary to obtain optimal (approximate) cloning strategies with short depth quantum circuits.
We derive attacks on two protocols as examples, based on quantum cloning and facilitated by VQC.
arXiv Detail & Related papers (2020-12-21T15:28:09Z) - Quantum Key Recovery Attack on SIMON Block Cipher [11.112331561801605]
We study quantum key recovery attack on SIMON block cipher using Quantum Amplitude Amplification algorithm in Q1 model.
We take the quantum attack on 19-round SIMON32/64 for an example and design the quantum circuit of the key recovery process.
arXiv Detail & Related papers (2020-12-12T02:15:47Z) - Quantum Period Finding against Symmetric Primitives in Practice [3.04585143845864]
We present the first complete implementation of the offline Simon's algorithm, and estimate its cost to attack the Chaskey, the block cipher PRINCE and the NIST lightweight candidate AEAD scheme Elephant.
These attacks require a reasonable amount of qubits, comparable to the number of qubits required to break RSA-2048.
We stress that our attacks could be applied in the future against today's communications, and recommend caution when choosing symmetric constructions for cases where long-term security is expected.
arXiv Detail & Related papers (2020-11-13T17:12:49Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.