2022
DOI: 10.1093/comjnl/bxab216
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Attacks on 1K-AES and PRINCE

Abstract: By introducing the BHT algorithm into the slide attack on 1K-AES and the related-key attack on PRINCE, we present the corresponding quantum attacks in this paper. In the proposed quantum attacks, we generalize the BHT algorithm to the situation where the number of marked items is unknown ahead of time. Moreover, we give an implementation scheme of classifier oracle based on Quantum Phase Estimation algorithm in presented quantum attacks. The complexity analysis shows that the query complexity, time complexity … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…x 25 2 = x ⊕ R 24 (x 22 2 ⊕ R 23 (x 22 1 )) ⊕ R 25 (x 22 2 ⊕ R 23 (x 22 1 )) (29) From Figure 5 (red line), the function can be described as…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…x 25 2 = x ⊕ R 24 (x 22 2 ⊕ R 23 (x 22 1 )) ⊕ R 25 (x 22 2 ⊕ R 23 (x 22 1 )) (29) From Figure 5 (red line), the function can be described as…”
Section: Discussionmentioning
confidence: 99%
“…x 25 2 = x ⊕ C 1 (30) where C 1 = R 24 (x 22 2 ⊕ R 23 (x 22 1 )) ⊕ R 25 (x 22 2 ⊕ R 23 (x 22 1 )) is a constant. After an additional 1 round, the value x 22 1 is used as the input of R 26 and the output of R 26 is xored into x 22 2 ⊕ R 23 (x 22 1 ).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the total flow of the AES algorithm, three substitutions and one column mixing operation are included, which are carried out reciprocally using byte substitution, row shifting, column mixing, and round key addition, and a total of nine rounds of iterations are completed, where the tenth round of iterations does not include column mixing [14]. In the final session, the round key addition is employed to process the data and generate the ciphertext.…”
Section: Aes Encryptionmentioning
confidence: 99%
“…A quantum critical generation method based on R = 1 M bit/s is proposed. Packets queued for encryption obey Poisson distribution, and the arrival rate of packets queued for encryption is the same [14]. The total requirement for the four queue keys is 1M bit/s.…”
Section: Simulation Analysismentioning
confidence: 99%