2021
DOI: 10.46586/tches.v2022.i1.1-27
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Period Finding against Symmetric Primitives in Practice

Abstract: We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, and estimate their cost to attack the MAC Chaskey, the block cipher PRINCE and the NIST lightweight finalist AEAD scheme Elephant. These attacks require a reasonable amount of qubits, comparable to the number of qubits required to break RSA-2048. They are faster than other collision algorithms, and the attacks against PRINCE and Chaskey are the most efficient known to date. As Elephant has a key smaller than its s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…GMS uses a Grover search of the right k, which calls Simon's algorithm as a test. Its quantum complexity has been analyzed in detail in [Bon21,BJ22]. As for Simon's algorithm, the constant in the O(n) is close to 1 if we assume the functions to be random, and the gate count in O n 3 is usually smaller than the cost of n function computations.…”
Section: Grover-meet-simon As a Pmitm Attackmentioning
confidence: 99%
“…GMS uses a Grover search of the right k, which calls Simon's algorithm as a test. Its quantum complexity has been analyzed in detail in [Bon21,BJ22]. As for Simon's algorithm, the constant in the O(n) is close to 1 if we assume the functions to be random, and the gate count in O n 3 is usually smaller than the cost of n function computations.…”
Section: Grover-meet-simon As a Pmitm Attackmentioning
confidence: 99%
“…The presentation of offline-Simon in [12,11,13], which we followed in the previous section, constructs an exact starting database, that is, a superposition of tuples (x, f (x)) with all xes forming an affine space. Note that to construct such a vector space, there are some constraints on the queries.…”
Section: Attack With Known-plaintext Queriesmentioning
confidence: 99%
“…The quantum security of symmetric primitives has attracted an increasing interest in the last few years. Some works have targeted the security of generic constructions, for example [21,22,20], while others have studied the security of actual designs [7,19,5]. Many have proposed quantum versions of popular classical attacks, like for instance [20,6].…”
Section: Introductionmentioning
confidence: 99%