Quantum rectangle attack and its application on Deoxys-BC

被引:0
|
作者
Xu, Yin-Song [1 ,2 ]
Luo, Yi-Bo [2 ,4 ]
Yuan, Zheng [2 ]
Zhou, Xuan [5 ]
You, Qi-di [5 ]
Gao, Fei [1 ]
Dong, Xiao-Yang [3 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Beijing Elect Sci & Technol Inst, Beijing 100070, Peoples R China
[3] Tsinghua Univ, Inst Adv Study, BNRist, Beijing 100084, Peoples R China
[4] Univ Sci & Technol China, Sch Cyber Sci & Technol, Hefei 230026, Peoples R China
[5] Beijing Inst Satellite Informat Engn, Beijing 100086, Peoples R China
基金
中国国家自然科学基金;
关键词
Rectangle attack; Deoxys-BC; Quantum rectangle attack; Automatic search; Post-quantum security; SECURITY ANALYSIS; ALGORITHM; SKINNY;
D O I
10.1007/s10623-024-01526-3
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, it has become a popular trend to propose quantum versions of classical attacks. The rectangle attack as a differential attack is widely used in symmetric cryptanalysis and applied on many block ciphers. To improve its efficiency, we propose a new quantum rectangle attack firstly. In rectangle attack, it counts the number of valid quartets for each guessed subkeys and filters out subkey candidates according to the counter. To speed up this procedure, we propose a quantum key counting algorithm based on parallel amplitude estimation algorithm and amplitude amplification algorithm. Then, we complete with the remaining key bits and search the right full key by nested Grover search. Besides, we give a strategy to find a more suitable distinguisher to make the complexity lower. Finally, to evaluate post-quantum security of the tweakable block cipher Deoxys-BC, we perform automatic search for good distinguishers of Deoxys-BC according to the strategy, and then apply our attack on 9/10-round Deoxys-BC-256 and 12/13/14-round Deoxys-BC-384. The results show that our attack has some improvements than classical attacks and Grover search.
引用
收藏
页码:553 / 590
页数:38
相关论文
共 18 条
  • [1] Quantum rectangle attack and its application on Deoxys-BCQuantum rectangle attack and its application on Deoxys-BCY.-S. Xu et al.
    Yin-Song Xu
    Yi-Bo Luo
    Zheng Yuan
    Xuan Zhou
    Qi-di You
    Fei Gao
    Xiao-Yang Dong
    Designs, Codes and Cryptography, 2025, 93 (3) : 553 - 590
  • [2] Improved related-tweakey rectangle attacks on round-reduced Deoxys-BC
    Liu, Jiamei
    Tan, Lin
    Xu, Hong
    IET INFORMATION SECURITY, 2023, 17 (03) : 407 - 422
  • [3] New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect
    Zhao, Boxin
    Dong, Xiaoyang
    Jia, Keting
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (03) : 121 - 151
  • [4] New Related-Tweakey Boomerang Attacks and Distinguishers on Deoxys-BC
    Liu, Jiamei
    Tan, Lin
    Xu, Hong
    Ma, Jianfeng
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (03) : 683 - 693
  • [5] Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128
    Zhao, Boxin
    Dong, Xiaoyang
    Jia, Keting
    Meier, Willi
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019, 2019, 11898 : 139 - 159
  • [6] MILP-based Related-Key Rectangle Attack and Its Application to GIFT, Khudra, MIBS
    Chen, Lele
    Wang, Gaoli
    Zhang, GuoYan
    COMPUTER JOURNAL, 2019, 62 (12) : 1805 - 1821
  • [7] Quantum walk and its application domains: A systematic review
    Kadian, Karuna
    Garhwal, Sunita
    Kumar, Ajay
    COMPUTER SCIENCE REVIEW, 2021, 41
  • [8] The (related-key) impossible boomerang attack and its application to the AES block cipher
    Lu, Jiqiang
    DESIGNS CODES AND CRYPTOGRAPHY, 2011, 60 (02) : 123 - 143
  • [9] FRACTIONAL QUANTUM LOGISTIC MAP AND ITS APPLICATION IN IMAGE ENCRYPTION TECHNOLOGY
    Liu, Ze-Yu
    Xia, Tiecheng
    Wang, Yi-Ping
    FRACTALS-COMPLEX GEOMETRY PATTERNS AND SCALING IN NATURE AND SOCIETY, 2021, 29 (07)
  • [10] Enhanced quantum-based neural network learning and its application to signature verification
    Patel, Om Prakash
    Tiwari, Aruna
    Chaudhary, Rishabh
    Nuthalapati, Sai Vidyaranya
    Bharill, Neha
    Prasad, Mukesh
    Hussain, Farookh Khadeer
    Hussain, Omar Khadeer
    SOFT COMPUTING, 2019, 23 (09) : 3067 - 3080