Quantum Attacks on Type-3 Generalized Feistel Scheme and Unbalanced Feistel Scheme with Expanding Functions

被引:0
|
作者
ZHANG Zhongya [1 ,2 ,3 ]
WU Wenling [1 ,2 ]
SUI Han [1 ,4 ]
WANG Bolin [1 ,2 ]
机构
[1] Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences
[2] University of Chinese Academy of Sciences
[3] Luoyang Normal University
[4] State Key Laboratory of Cryptology
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
O413 [量子论]; TN918.4 [密码的加密与解密];
学科分类号
摘要
Quantum algorithms are raising concerns in the field of cryptography all over the world. A growing number of symmetric cryptography algorithms have been attacked in the quantum setting. Type-3 generalized Feistel scheme(GFS) and unbalanced Feistel scheme with expanding functions(UFS-E) are common symmetric cryptography schemes, which are often used in cryptographic analysis and design. We propose quantum distinguishing attacks on Type-3 GFS and UFS-E in the quantum chosen plaintext attack setting. The results of key recovery are better than those based on exhaustive search in the quantum setting.
引用
收藏
页码:209 / 216
页数:8
相关论文
共 32 条
  • [21] Cryptanalysis against Type-III Generalized Feistel Networks and Its Variants with SP Type Round Functions
    Zhang, Yi
    Shen, Xuan
    Liu, Guoqiang
    Li, Chao
    2022 IEEE 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2022), 2022, : 71 - 76
  • [22] Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles
    Daiza, Takanori
    Yoneyama, Kazuki
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2022, 2022, 13504 : 128 - 144
  • [23] Improved Quantum Attack on Type-1 Generalized Feistel Schemes and Its Application to CAST-256
    Ni Boyu
    Dong Xiaoyang
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (02) : 295 - 306
  • [24] Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method
    Blondeau, Celine
    Minier, Marine
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 92 - 113
  • [25] Improving the Permutation Layer of Type 1, Type 3, Source-Heavy, and Target-Heavy Generalized Feistel Structures
    Yanagihara, Shingo
    Iwata, Tetsu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 2 - 14
  • [26] Lightweight Certificateless Signcryption Scheme Using Type-3 Pairing on Elliptic Curve
    Khamseh, Elaheh
    Reza, Akram
    Esterabadi, Afshin Soltani
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 135 (03) : 1497 - 1517
  • [27] Type-3 PLL Based Speed Estimation Scheme for Sensorless Linear Induction Motor Drives
    Wang, Huimin
    Ge, Xinglai
    2019 10TH INTERNATIONAL CONFERENCE ON POWER ELECTRONICS AND ECCE ASIA (ICPE 2019 - ECCE ASIA), 2019,
  • [28] Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings
    Okano, Hiroshi
    Emura, Keita
    Ishibashi, Takuya
    Ohigashi, Toshihiro
    Suzuki, Tatsuya
    2019 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR 2019), 2019, : 191 - 196
  • [29] Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes
    Dong, Le
    Wang, Yanling
    Wu, Wenling
    Zou, Jian
    IET INFORMATION SECURITY, 2015, 9 (05) : 277 - 283
  • [30] A Novel Scheme for Quantum Teleportation of N-Particle Generalized Bell-Type States Using Minimal Entanglement Resources
    Joy, Dintomon
    Adwaith, K., V
    Sabir, M.
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (05) : 1546 - 1554