2021
DOI: 10.1007/s11128-021-03118-9
|View full text |Cite
|
Sign up to set email alerts
|

Quantum search for scaled hash function preimages

Abstract: We present the implementation of Grover’s algorithm in a quantum simulator to perform a quantum search for preimages of two scaled hash functions, whose design only uses modular addition, word rotation and bitwise exclusive or. Our implementation provides the means to assess with precision the scaling of the number of gates and depth of a full-fledged quantum circuit designed to find the preimages of a given hash digest. The detailed construction of the quantum oracle shows that the presence of AND gates, OR g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 39 publications
(56 reference statements)
0
3
0
Order By: Relevance
“…Define the length of the sensitive information of physical fitness in Colleges and universities to be encrypted as N, construct the sensitive characteristic quantity of physical fitness in Colleges and universities by using the symmetric hash function [17], use the distribution of 0 and 1 to carry out the error correction control of physical fitness encryption in Colleges and Universities, and obtain the transmission protocol of sensitive key of physical fitness in Colleges and universities according to the input system parameters:…”
Section: Mixed Encryption Of Sports Fitness Sensitive Informationmentioning
confidence: 99%
“…Define the length of the sensitive information of physical fitness in Colleges and universities to be encrypted as N, construct the sensitive characteristic quantity of physical fitness in Colleges and universities by using the symmetric hash function [17], use the distribution of 0 and 1 to carry out the error correction control of physical fitness encryption in Colleges and Universities, and obtain the transmission protocol of sensitive key of physical fitness in Colleges and universities according to the input system parameters:…”
Section: Mixed Encryption Of Sports Fitness Sensitive Informationmentioning
confidence: 99%
“…In contrast to the past study [6], based on the Grover algorithm [7] allowing for quadratic improvement, where a pre-image attack on hash functions using gate-based approach on universal quantum computers was touched upon, we propose to solve the same problem using quantum annealing devices, which offers an advantage of the possibility of utilizing more qubits.…”
Section: Methodsmentioning
confidence: 99%
“…Grover’s search can decrease the security of symmetric key ciphers by a factor of the square root. In response, various symmetric key ciphers are being analysed under the Grover search algorithm [ 3 , 4 , 5 , 6 ]. It is worth noting that the quantum resources (elements that make up a quantum circuit such as quantum gates, qubits, and circuit depth) for applying the Grover’s search to AES [ 3 , 7 , 8 , 9 ] are being used as a standard for estimating post-quantum security strength by NIST [ 10 ].…”
Section: Introductionmentioning
confidence: 99%