A Quantum Automatic Tool for Finding Impossible Differentials
- URL: http://arxiv.org/abs/2407.10056v1
- Date: Sun, 14 Jul 2024 03:00:24 GMT
- Title: A Quantum Automatic Tool for Finding Impossible Differentials
- Authors: Huiqin Xie, Qiqing Xia, Ke Wang, Yanjun Li, Li Yang,
- Abstract summary: We propose two quantum automatic tools for searching impossible differentials.
The proposed quantum algorithms exploit the idea of miss-in-the-middle and the properties of truncated differentials.
- Score: 12.997422492640766
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Due to the superiority of quantum computing, traditional cryptography is facing severe threat. This makes the security evaluation of cryptographic systems in quantum attack models significant and urgent. For symmetric ciphers, the security analysis heavily relies on cyptanalytic tools. Thus exploring the use of quantum algorithms to traditional cyptanalytic tools has drawn a lot of attention. In this study, we utilize quantum algorithms to improve impossible differential attack, and design two quantum automatic tools for searching impossible differentials. The proposed quantum algorithms exploit the idea of miss-in-the-middle and the properties of truncated differentials. We rigorously prove their validity and calculate the quantum resources required to implement them. Compared to existing classical automatic cryptanalysis, the quantum tools proposed have the advantage of accurately characterizing S-boxes while only requiring polynomial complexity, and can take into consideration the impact of the key schedules in single-key model.
Related papers
- Quantum Indistinguishable Obfuscation via Quantum Circuit Equivalence [6.769315201275599]
Quantum computing solutions are increasingly deployed in commercial environments through delegated computing.
One of the most critical issues is to guarantee the confidentiality and proprietary of quantum implementations.
Since the proposal of general-purpose indistinguishability obfuscation (iO) and functional encryption schemes, iO has emerged as a seemingly versatile cryptography primitive.
arXiv Detail & Related papers (2024-11-19T07:37:24Z) - Efficient Learning for Linear Properties of Bounded-Gate Quantum Circuits [63.733312560668274]
Given a quantum circuit containing d tunable RZ gates and G-d Clifford gates, can a learner perform purely classical inference to efficiently predict its linear properties?
We prove that the sample complexity scaling linearly in d is necessary and sufficient to achieve a small prediction error, while the corresponding computational complexity may scale exponentially in d.
We devise a kernel-based learning model capable of trading off prediction error and computational complexity, transitioning from exponential to scaling in many practical settings.
arXiv Detail & Related papers (2024-08-22T08:21:28Z) - The curse of random quantum data [62.24825255497622]
We quantify the performances of quantum machine learning in the landscape of quantum data.
We find that the training efficiency and generalization capabilities in quantum machine learning will be exponentially suppressed with the increase in qubits.
Our findings apply to both the quantum kernel method and the large-width limit of quantum neural networks.
arXiv Detail & Related papers (2024-08-19T12:18:07Z) - Quantum Truncated Differential and Boomerang Attack [10.853582091917236]
In this article, we concentrate on truncated differential and boomerang cryptanalysis.
We first present a quantum algorithm which is designed for finding truncated differentials of symmetric ciphers.
We prove that, with a overwhelming probability, the truncated differentials output by our algorithm must have high differential probability for the vast majority of keys in key space.
arXiv Detail & Related papers (2024-07-21T11:34:29Z) - Quantum Subroutine for Variance Estimation: Algorithmic Design and Applications [80.04533958880862]
Quantum computing sets the foundation for new ways of designing algorithms.
New challenges arise concerning which field quantum speedup can be achieved.
Looking for the design of quantum subroutines that are more efficient than their classical counterpart poses solid pillars to new powerful quantum algorithms.
arXiv Detail & Related papers (2024-02-26T09:32:07Z) - Enhancing variational quantum state diagonalization using reinforcement
learning techniques [1.583327010995414]
We tackle the problem of designing a very shallow quantum circuit, required in the quantum state diagonalization task.
We use a novel encoding method for the RL-state, a dense reward function, and an $epsilon$-greedy policy to achieve this.
We demonstrate that the circuits proposed by the reinforcement learning methods are shallower than the standard variational quantum state diagonalization algorithm.
arXiv Detail & Related papers (2023-06-19T17:59:04Z) - Unclonability and Quantum Cryptanalysis: From Foundations to
Applications [0.0]
Unclonability is a fundamental concept in quantum theory and one of the main non-classical properties of quantum information.
We introduce new notions of unclonability in the quantum world, namely quantum physical unclonability.
We discuss several applications of this new type of unclonability as a cryptographic resource for designing provably secure quantum protocols.
arXiv Detail & Related papers (2022-10-31T17:57:09Z) - Circuit Symmetry Verification Mitigates Quantum-Domain Impairments [69.33243249411113]
We propose circuit-oriented symmetry verification that are capable of verifying the commutativity of quantum circuits without the knowledge of the quantum state.
In particular, we propose the Fourier-temporal stabilizer (STS) technique, which generalizes the conventional quantum-domain formalism to circuit-oriented stabilizers.
arXiv Detail & Related papers (2021-12-27T21:15:35Z) - Variational Quantum Cloning: Improving Practicality for Quantum
Cryptanalysis [2.064612766965483]
We propose variational quantum cloning (VQC), a machine learning based cryptanalysis algorithm.
VQC allows an adversary to obtain optimal (approximate) cloning strategies with short depth quantum circuits.
We derive attacks on two protocols as examples, based on quantum cloning and facilitated by VQC.
arXiv Detail & Related papers (2020-12-21T15:28:09Z) - QUANTIFY: A framework for resource analysis and design verification of
quantum circuits [69.43216268165402]
QUANTIFY is an open-source framework for the quantitative analysis of quantum circuits.
It is based on Google Cirq and is developed with Clifford+T circuits in mind.
For benchmarking purposes QUANTIFY includes quantum memory and quantum arithmetic circuits.
arXiv Detail & Related papers (2020-07-21T15:36:25Z) - Quantum noise protects quantum classifiers against adversaries [120.08771960032033]
Noise in quantum information processing is often viewed as a disruptive and difficult-to-avoid feature, especially in near-term quantum technologies.
We show that by taking advantage of depolarisation noise in quantum circuits for classification, a robustness bound against adversaries can be derived.
This is the first quantum protocol that can be used against the most general adversaries.
arXiv Detail & Related papers (2020-03-20T17:56:14Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.