2019
DOI: 10.48550/arxiv.1910.01700
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Implementing Grover oracles for quantum key search on AES and LowMC

Abstract: Grover's search algorithm gives a quantum attack against block ciphers by searching for a key that matches a small number of plaintext-ciphertext pairs. This attack uses O( √ N ) calls to the cipher to search a key space of size N . Previous work in the specific case of AES derived the full gate cost by analyzing quantum circuits for the cipher, but focused on minimizing the number of qubits.In contrast, we study the cost of quantum key search attacks under a depth restriction and introduce techniques that red… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Post-quantum symmetric cryptography considers (mainly) the logical attack by Grover's algorithm [10], which is a probabilistic quantum algorithm providing a square-root speed-up in the number of evaluations for a black box function. Applying Grover's algorithm to Problem 3 to retrieve the secret key k ∈ F 2 for a symmetric encryption is well investigated (for details see [11], [27], [28]). We recall it in the following theorem and then state our result for logic locking as defined in Def.…”
Section: A Post-quantum Key Length For Logic Lockingmentioning
confidence: 99%
“…Post-quantum symmetric cryptography considers (mainly) the logical attack by Grover's algorithm [10], which is a probabilistic quantum algorithm providing a square-root speed-up in the number of evaluations for a black box function. Applying Grover's algorithm to Problem 3 to retrieve the secret key k ∈ F 2 for a symmetric encryption is well investigated (for details see [11], [27], [28]). We recall it in the following theorem and then state our result for logic locking as defined in Def.…”
Section: A Post-quantum Key Length For Logic Lockingmentioning
confidence: 99%
“…For each cryptographic function and floating-point operation, we report the two quantum circuits with the fewest number of qubits (first row) and the lowest T -depth (second row). The corresponding 10 4 Grassl, Langenberg, Roetteler, Steinwandt [18] Langenberg, Pham, Steindwandt [25] Jaques, Naehrig, Roetteler, Virdia [22] Amy, Matteo, Gheorghiu, Mosca, Parent, Schanck [3] Haener, Soeken, Roetteler, Svore [19] This work…”
Section: T -Depth Optimizationmentioning
confidence: 99%