Article
Quantum Science & Technology
Rui Shi, Huiqin Xie, Huamin Feng, Feng Yuan, Biao Liu
Summary: Investigating the impact of quantum computing on the security of symmetric cryptosystems is of urgent importance. Through studying the applications of quantum algorithms to classical cryptanalytic tools, we propose two quantum algorithms for finding zero correlation linear sets in Feistel ciphers and SPN ciphers. We prove that the linear approximations output by the proposed algorithms have zero correlation with a probability close to one, as long as certain algebraic conditions of the attacked block ciphers are satisfied. These algorithms have polynomial-time quantum complexity and do not require any quantum or classical queries to the attacked block ciphers. Compared to classical zero correlation linear cryptanalysis, the quantum version has the advantage of extending the number of rounds of zero correlation linear approximations.
QUANTUM INFORMATION PROCESSING
(2022)
Article
Computer Science, Theory & Methods
Zhongya Zhang, Wenling Wu, Han Sui, Bolin Wang
Summary: Post-quantum cryptography is a topic of great interest in the field of cryptography worldwide. Several symmetric cryptography algorithms have been analyzed in the context of quantum computing. This study explores the security of the Lai-Massey scheme in a quantum setting and proposes a technique for simulating the XOR of quantum oracle outputs without destroying quantum entanglement. The results show that the 3-round and 4-round Lai-Massey schemes are insecure and vulnerable to distinguishing attacks. Furthermore, quantum key-recovery attacks are introduced using a combination of Simon's and Grover's algorithms on the Lai-Massey scheme.
DESIGNS CODES AND CRYPTOGRAPHY
(2023)
Article
Computer Science, Theory & Methods
Tarun Yadav, Manoj Kumar, Amit Kumar, S. K. Pal
Summary: Differential attack is a cryptanalysis method that exploits input and output differences in block ciphers. Existing research in quantum differential cryptanalysis focuses on resource estimation for recovering subkeys using classical methods. We propose a quantum method to search for high probability differential and impossible differential characteristics. We design a quantum circuit to search for differential characteristics in a toy cipher and validate the results using branch-and-bound based methods. The differential characteristics are then used for quantum key recovery attack using Grover's search. We also provide resource estimation for searching the differential characteristics of lightweight block cipher GIFT-64 on a quantum computer.
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES
(2023)
Article
Computer Science, Information Systems
Kai Zhang, Xuejia Lai, Jie Guan, Bin Hu
Summary: In this paper, a new lightweight block cipher mu(2) is proposed, which performs well in constrained resource environments. However, the security evaluation on mu(2) against impossible differential cryptanalysis is missing. Therefore, an impossible differential cryptanalysis on mu(2) is proposed, revealing that mu(2) cannot resist this attack in less than 10 rounds.
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
(2022)
Article
Computer Science, Information Systems
Huijiao Wang, Jiapeng Tian, Xin Zhang, Yongzhuang Wei, Hua Jiang
Summary: In this study, the authors propose novel multiple differential distinguishers for round-reduced SIMECK32/64 based on deep learning. Two types of deep learning distinguishers are designed using neural networks, which simulate multiple input differences and multiple output differences in differential cryptanalysis. The experimental results confirm that the proposed distinguishers outperform the traditional distinguisher in terms of accuracy and number of rounds, and the relationship between the quantity of multiple differences and the performance of the distinguishers is verified.
SECURITY AND COMMUNICATION NETWORKS
(2022)
Article
Mathematics, Interdisciplinary Applications
Adelaide Nicole Kengnou Telem, Cyrille Feudjio, Balamurali Ramakrishnan, Hilaire Bertrand Fotsin, Karthikeyan Rajagopal
Summary: In this paper, a new and simple image encryption method is proposed, which utilizes an external secret key of 128 bits and an internal secret key. The novelty lies in the methods used to extract the internal key and apply the zigzag, affine transformation, and substitution-diffusion processes. Experimental results show that the proposed encryption scheme provides good statistical and diffusion properties, and can resist various attacks, making it suitable for real-time encryption and transmission of biomedical images in telemedicine.
Article
Quantum Science & Technology
Andriyan Bilyk, Javad Doliskani, Zhiyong Gong
Summary: We investigate the security assumptions of three public-key quantum money schemes and confirm the insecurity of Aaronson and Christiano's scheme as well as Zhandry's scheme by providing polynomial time quantum algorithms to solve their underlying problems. We also propose a quantum reduction from the hard problem in Kane et al.'s scheme to a linear algebra problem. Our findings highlight the importance of further cryptanalysis in this area.
QUANTUM INFORMATION PROCESSING
(2023)
Article
Multidisciplinary Sciences
Kai Zhang, Xuejia Lai
Summary: This paper introduces a method for constructing integral distinguishers for ARX ciphers. By utilizing the symmetry between zero-correlation linear distinguishers and integral distinguishers, a subspace for the distinguishers is constructed and successfully converted into integral distinguishers. Experimental results demonstrate the effectiveness of this method.
Article
Computer Science, Information Systems
Kai Zhang, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Senpeng Wang, Tairong Shi
Summary: A security evaluation framework for AND-RX ciphers against rotational-XOR differential crypt-analysis is proposed in this paper. The framework models the structure of rotational-XOR differential trails and introduces a method to calculate this structure. An automatic method is then presented for searching RXD trails, with strategies to improve the efficiency. The framework is applied to SIMON and Simeck variants, achieving significant improvements in RXD trails. Concrete experiments on Simeck32 validate the derived rotational-XOR differential trails.
IEEE TRANSACTIONS ON INFORMATION THEORY
(2023)
Article
Computer Science, Hardware & Architecture
Pei Li, Shihao Zhou, Jiageng Chen
Summary: This paper proposes a parallel search algorithm for the best differential characteristic in differential cryptanalysis. Experimental results show that the algorithm can achieve significant speed-up compared to the sequential version.
JOURNAL OF SUPERCOMPUTING
(2021)
Article
Computer Science, Information Systems
Wei Jian Teng, Je Sen Teh, Norziana Jamil
Summary: Interest in deep learning in cryptography has grown significantly in recent years. Research has shown that these attacks are not only possible but sometimes even more effective than traditional techniques. However, more work is needed to understand how deep learning models function in the context of cryptanalysis.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Wenqiang Tian, Bin Hu
Summary: The study evaluates the security of the SIMON cipher under neural differential cryptanalysis, proving theoretically that SIMON is a non-Markov cipher and training neural distinguishers using a residual neural network to achieve successful distinguishing and key-recovery attacks on 15-round SIMON32/64 with better results than existing literature.
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
(2021)
Article
Chemistry, Multidisciplinary
Kunbolat Algazy, Kairat Sakan, Nursulu Kapalova, Saule Nyssanbayeva, Dilmukhanbet Dyusenbayev
Summary: The article examines the new hashing algorithm HBC-256 and focuses on its differential characteristics and construction methods. The research shows that even with the best method, it is difficult to find collisions using differential cryptanalysis.
APPLIED SCIENCES-BASEL
(2022)
Article
Multidisciplinary Sciences
Yen Yee Chan, Cher-Yin Khor, Boo Tap Khoo, Je Sen Teh, Wei Jian Teng, Norziana Jamil
Summary: This paper evaluates the security of four lightweight Feistel-based block ciphers (SLIM, LBC-IoT, SCENERY, and LCB) against differential cryptanalysis attacks. It was found that SLIM had a 7-round differential trail, LBC-IoT was weaker against differential cryptanalysis, SCENERY had an 11-round differential trail, and LCB lacked nonlinearity in its design. These results provide valuable insights for the research and application of cryptography.
Review
Computer Science, Hardware & Architecture
Ashwini Kumar Malviya, Namita Tiwari, Meenu Chawla
Summary: This article reviews several latest quantum cryptanalysis techniques of symmetric cryptography, explaining the design theory of the approach and the improvements it can achieve compared to classical techniques. It highlights the potential for quantum cryptanalysis to achieve significant speedup and successfully attack most symmetric ciphers. This information is useful for cryptologists to include these new quantum cryptanalysis techniques in their toolbox and develop post-quantum symmetric ciphers.
COMPUTERS & ELECTRICAL ENGINEERING
(2022)