Qubit Optimized Quantum Implementation of SLIM
- URL: http://arxiv.org/abs/2412.10835v1
- Date: Sat, 14 Dec 2024 13:52:36 GMT
- Title: Qubit Optimized Quantum Implementation of SLIM
- Authors: Hasan Ozgur Cildiroglu, Oguz Yayla,
- Abstract summary: We introduce a novel quantum implementation of SLIM, a lightweight block cipher optimized for 32-bit plaintext and an 80-bit key.
This work highlights SLIM's potential as a resource-efficient and secure candidate for quantum-resistant encryption protocols.
- Score: 0.0
- License:
- Abstract: The advent of quantum computing has profound implications for current technologies, offering advancements in optimization while posing significant threats to cryptographic algorithms. Public-key cryptosystems relying on prime factorization or discrete logarithms are particularly vulnerable, whereas block ciphers (BCs) remain secure through increased key lengths. In this study, we introduce a novel quantum implementation of SLIM, a lightweight block cipher optimized for 32-bit plaintext and an 80-bit key, based on a Feistel structure. This implementation distinguishes itself from other BC quantum implementations in its class (64-128-bit) by utilizing a minimal number of qubits while maintaining robust cryptographic strength and efficiency. By employing an innovative design that minimizes qubit usage, this work highlights SLIM's potential as a resource-efficient and secure candidate for quantum-resistant encryption protocols.
Related papers
- End-to-end compilable implementation of quantum elliptic curve logarithm in Qrisp [0.0]
Elliptic curve cryptography (ECC) is recognized for its effectiveness and reliability across a broad range of applications.
We leverage the Qrisp programming language to realize one of the first fully compilable implementations of EC arithmetic.
arXiv Detail & Related papers (2025-01-17T14:45:38Z) - Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Designing Hash and Encryption Engines using Quantum Computing [2.348041867134616]
We explore quantum-based hash functions and encryption to fortify data security.
The integration of quantum and classical methods demonstrates potential in securing data in the era of quantum computing.
arXiv Detail & Related papers (2023-10-26T14:49:51Z) - Near-Term Distributed Quantum Computation using Mean-Field Corrections
and Auxiliary Qubits [77.04894470683776]
We propose near-term distributed quantum computing that involve limited information transfer and conservative entanglement production.
We build upon these concepts to produce an approximate circuit-cutting technique for the fragmented pre-training of variational quantum algorithms.
arXiv Detail & Related papers (2023-09-11T18:00:00Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Decomposition of Matrix Product States into Shallow Quantum Circuits [62.5210028594015]
tensor network (TN) algorithms can be mapped to parametrized quantum circuits (PQCs)
We propose a new protocol for approximating TN states using realistic quantum circuits.
Our results reveal one particular protocol, involving sequential growth and optimization of the quantum circuit, to outperform all other methods.
arXiv Detail & Related papers (2022-09-01T17:08:41Z) - Variational Quantum Optimization with Multi-Basis Encodings [62.72309460291971]
We introduce a new variational quantum algorithm that benefits from two innovations: multi-basis graph complexity and nonlinear activation functions.
Our results in increased optimization performance, two increase in effective landscapes and a reduction in measurement progress.
arXiv Detail & Related papers (2021-06-24T20:16:02Z) - Variational Quantum Cloning: Improving Practicality for Quantum
Cryptanalysis [2.064612766965483]
We propose variational quantum cloning (VQC), a machine learning based cryptanalysis algorithm.
VQC allows an adversary to obtain optimal (approximate) cloning strategies with short depth quantum circuits.
We derive attacks on two protocols as examples, based on quantum cloning and facilitated by VQC.
arXiv Detail & Related papers (2020-12-21T15:28:09Z) - Quantum Ciphertext Dimension Reduction Scheme for Homomorphic Encrypted
Data [4.825895794318393]
Proposed quantum principal component extraction algorithm (QPCE)
A quantum homomorphic ciphertext dimension reduction scheme (QHEDR)
A quantum ciphertext dimensionality reduction scheme implemented in the quantum cloud.
arXiv Detail & Related papers (2020-11-19T07:16:22Z) - A quantum encryption design featuring confusion, diffusion, and mode of
operation [0.0]
We propose a non-OTP quantum encryption scheme utilizing a quantum state creation process to encrypt messages.
As essentially a non-OTP quantum block cipher the method stands out against existing methods with the following features.
arXiv Detail & Related papers (2020-10-06T22:23:30Z) - Space-efficient binary optimization for variational computing [68.8204255655161]
We show that it is possible to greatly reduce the number of qubits needed for the Traveling Salesman Problem.
We also propose encoding schemes which smoothly interpolate between the qubit-efficient and the circuit depth-efficient models.
arXiv Detail & Related papers (2020-09-15T18:17:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.