Article
Quantum Science & Technology
Bao-Min Zhou, Zheng Yuan
Summary: The development of quantum computers has prompted the cryptographic community to prepare for the post-quantum world. In this study, a new quantum key-recovery attack was developed by combining Bernstein-Vazirani's and Grover's algorithms, reducing the complexity of key recovery. This method has shown strong practicality for key recovery in various encryption algorithms like DES and Camellia.
QUANTUM INFORMATION PROCESSING
(2021)
Article
Quantum Science & Technology
Bao-Min Zhou, Zheng Yuan
Summary: In this paper, we propose an offline algorithm model that combines distributed Simon's and Grover's algorithms. This model enables us to perform key recovery attacks on different rounds Feistel structures, Even Mansour construction, and the FX construction, while minimizing the quantum query complexity. We leverage the algebraic structure of cryptosystems to achieve successful key recovery attacks, despite being limited to classical queries and offline quantum computations.
QUANTUM INFORMATION PROCESSING
(2023)
Article
Quantum Science & Technology
Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao
Summary: In this paper, the security of Type-1 GFS in the quantum environment is investigated. A new quantum polynomial-time distinguisher on Type-1 GFS with a certain number of rounds is provided, which extends previous results. Additionally, a 17-round quantum distinguisher in the qCPA setting for CAST-256, a block cipher based on Type-1 GFS, is given and a quantum key-recovery attack is constructed.
ADVANCED QUANTUM TECHNOLOGIES
(2023)
Article
Computer Science, Information Systems
Jingya Feng, Lang Li
Summary: SCENERY is a new lightweight block cipher designed for both hardware and software platforms, offering a well-balanced performance and sufficient security against known attacks.
FRONTIERS OF COMPUTER SCIENCE
(2022)
Article
Quantum Science & Technology
Jingyi Cu, Jiansheng Guo, Shuzhen Ding
Summary: This paper investigates the application of Simon's algorithm in analyzing the security of Feistel variants, introducing a definition of weakly periodic function and extensions of Simon's problem, as well as demonstrating quantum distinguishing attacks on several Feistel variants using Grover's algorithm. The results suggest that classically secure schemes may not be secure in the Q2 model.
QUANTUM INFORMATION PROCESSING
(2021)
Article
Computer Science, Information Systems
Kyungbae Jang, Gyeongju Song, Hyeokdong Kwon, Siwoo Uhm, Hyunji Kim, Wai-Kong Lee, Hwajeong Seo
Summary: The paper explores optimized quantum circuits of the SPN-structured lightweight block cipher PIPO, focusing on the compact design of the 8-bit Sbox quantum circuits. Furthermore, the evaluation of quantum resources for the Grover search algorithm on the PIPO block cipher is conducted in the IBM-provided quantum simulator ProejctQ.
Article
Quantum Science & Technology
Limei Guo, Hongwei Du, Duan Huang
Summary: This paper presents a quantum circuit design for an image encryption algorithm based on Feistel structure, using the enhanced quantum representation (NEQR) model. Through numerical simulation and analysis, the effectiveness of the proposed algorithm and its ability to resist statistical attacks are verified.
QUANTUM INFORMATION PROCESSING
(2022)
Article
Computer Science, Hardware & Architecture
Jinyu Lu, Yunwen Liu, Tomer Ashur, Chao Li
Summary: In this study, we investigate the resistance of Simon-like ciphers against rotational-XOR cryptanalysis by exploring the choice of key-expansion algorithm and its interaction with the round function. Our findings reveal that Simon is the most resistant among the considered key-expansion algorithms, while Simeck is more vulnerable. The implications on lightweight ciphers design are discussed, and open questions for further research are proposed.
Article
Quantum Science & Technology
Zhongya Zhang, Wenling Wu, Han Sui, Xiaodan Li
Summary: This paper focuses on the quantum security of KAF ciphers for shorter keys, showing that they are insecure against quantum chosen-plaintext attacks. The results demonstrate that the KAF ciphers for shorter keys can be distinguished from random permutation in the qCPA setting, even if either the round function or the number of rounds is unknown.
QUANTUM INFORMATION PROCESSING
(2022)
Article
Computer Science, Theory & Methods
Adam Jagielski, Krzysztof Kanciak
Summary: This paper proposes an estimation method for the quantum resources required to recover a key using a Known Plain Text Attack (KPA) model and implements a simplified version of the SCHWAEMM cipher using a quantum computer.
QUANTUM INFORMATION & COMPUTATION
(2022)
Article
Computer Science, Information Systems
Hui Liu, Li Yang
Summary: This paper studies the quantum key recovery attack on SIMON32/64 using Quantum Amplitude Amplification algorithm, improving efficiency by reanalyzing circuit complexity, attacking by designing quantum circuits of deciphered distinguishers and attack processes.
Article
Mathematics, Interdisciplinary Applications
Dezheng Zhang, Shunsheng Zhang, Yuling Luo, Lvchen Cao
Summary: This study investigates the hardware security of Feistel chaotic block cryptosystem by using Correlation Power Analysis (CPA) during the encryption process. The experimental results show that CPA can successfully obtain the secret key and lay the foundation for further research on Multiple Samples Correlation Power Analysis (MSCPA).
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS
(2022)
Article
Physics, Multidisciplinary
Shumpei Uno, Yohichi Suzuki, Keigo Hisanaga, Rudy Raymond, Tomoki Tanaka, Tamiya Onodera, Naoki Yamamoto
Summary: This study proposes a quantum amplitude estimation method that improves estimation accuracy in the ideal case and outperforms conventional methods under depolarizing noise. The method can achieve ultimate estimation accuracy characterized by quantum Fisher information with a large number of qubits, even with a simple non-adaptive measurement strategy. Numerical demonstrations show the method's ability to approach ultimate accuracy and surpass traditional methods.
NEW JOURNAL OF PHYSICS
(2021)
Article
Multidisciplinary Sciences
Ping Zhang
Summary: With the development of quantum technology, quantum computing has had an increasing impact on cryptanalysis. This paper focuses on the quantum related-key attack (qRKA) model and proposes a strategy using Simon's algorithm against symmetric ciphers. By constructing a periodic function, the secret key of symmetric ciphers can be efficiently recovered if they satisfy Simon's promise. The work is significant for the cryptanalysis of existing provably secure cryptographic schemes and the design of future quantum secure cryptographic schemes.
Article
Physics, Multidisciplinary
Yuxuan Du, Min-Hsiu Hsieh, Tongliang Liu, Dacheng Tao
Summary: The study introduces a Grover-search based quantum learning scheme (GBLS) to address the balance between computational cost and learning performance in quantum classifiers. Numerical simulations demonstrate that GBLS can achieve comparable performance with reduced measurements under various noise settings.
NEW JOURNAL OF PHYSICS
(2021)