2021
DOI: 10.46586/tosc.v2021.i1.337-377
|View full text |Cite
|
Sign up to set email alerts
|

Provably Quantum-Secure Tweakable Block Ciphers

Abstract: Recent results on quantum cryptanalysis show that some symmetric key schemes can be broken in polynomial time even if they are proven to be secure in the classical setting. Liskov, Rivest, and Wagner showed that secure tweakable block ciphers can be constructed from secure block ciphers in the classical setting. However, Kaplan et al. showed that their scheme can be broken by polynomial time quantum superposition attacks, even if underlying block ciphers are quantum-secure. Since then, it remains open if there… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Quantum-secure TBCs have been independently considered by Hosoyamada and Iwata in [19]. They used a stronger notion of security where tweaks can be queried in superposition, and showed how to construct such a TBC from a block cipher.…”
Section: Other Directionsmentioning
confidence: 99%
“…Quantum-secure TBCs have been independently considered by Hosoyamada and Iwata in [19]. They used a stronger notion of security where tweaks can be queried in superposition, and showed how to construct such a TBC from a block cipher.…”
Section: Other Directionsmentioning
confidence: 99%
“…Grover-meet-Simon algorithm [ 13 ] was first introduced by Leander and May, and combined Simon’s algorithm and Grover’s algorithm to achieve the key recovery attack against FX-construction. Currently, Simon’s algorithm, Grover’s algorithm, and Grover-meet-Simon algorithm have been extended to the Sum of Even–Mansour construction [ 14 ], encryption schemes [ 15 , 16 , 17 , 18 , 19 , 20 ], hash schemes [ 21 , 22 , 23 ], message authentication codes (MACs) [ 18 , 24 ], and authenticated encryption schemes [ 18 , 25 , 26 ]. There exist other quantum algorithms (such as HHL algorithm and BTH algorithm) and relevant quantum cryptanalysis.…”
Section: Introductionmentioning
confidence: 99%