Maintaining Secure Level on Symmetric Encryption under Quantum Attack

被引:2
作者
Shiu, Hung [1 ]
Yang, Chao-Tung [2 ,3 ]
Tsai, Yun-Ru [2 ]
Lin, Wei-Chung [1 ]
Lai, Chun-Ming [2 ]
机构
[1] Natl Taipei Univ, Dept Comp Sci & Informat Engn, New Taipei City 237, Taiwan
[2] Tunghai Univ, Dept Comp Sci, Taichung 407, Taiwan
[3] Tunghai Univ, Res Ctr Smart Sustainable Circular Econ, Taichung 407, Taiwan
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 11期
关键词
quantum computing; Shor's algorithm; Grover's algorithm; advanced encryption standard; strict avalanche criterion; Rijndael algorithm;
D O I
10.3390/app13116734
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Quantum computing is currently being researched in many countries, and if implemented in the near future, it may pose a threat to existing encryption standards. In the quantum computer environment, asymmetric encryption can be solved by Shor's Algorithm in polynomial time, and the difficulty of breaking symmetric encryption using brute force is reduced from N times to square root N times by Grover's Algorithm. We take the Advanced Encryption Standard as the theme and increase the key length from the original standard 192 bits and 256 bits to 384 bits and 512 bits, respectively, in order to maintain the security level of AES 192/256 under the environment of quantum computing, so we propose the key schedule of AES 384/512, and write the software in C++ on FPGA. The experimental results show that our scheme can achieve Level III and Level V security levels in a quantum computer attack environment. In addition to increasing the length of the key, we use the LUT method in the process of writing SubBytes to replace the array and speed up the computation to optimize the execution speed. In addition, the proposed scheme is still based on 128-bit computing blocks, rather than computing blocks in larger blocks.
引用
收藏
页数:14
相关论文
共 29 条
  • [1] On the security and confidentiality of quantum key distribution
    Al-Ghamdi, Al-Batool
    Al-Sulami, Ameenah
    Aljahdali, Asia Othman
    [J]. SECURITY AND PRIVACY, 2020, 3 (05)
  • [2] Al-Obeidat F., 2020, P FRONTIERS CYBER SE, P553
  • [3] Cyber security and beyond: Detecting malware and concept drift in AI-based sensor data streams using statistical techniques
    Amin, Muhammad
    Al-Obeidat, Feras
    Tubaishat, Abdallah
    Shah, Babar
    Anwar, Sajid
    Tanveer, Tamleek Ali
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
  • [4] Balupala H.K., 2021, P IEEE INT IOT EL ME
  • [5] Bhatia V., 2020, P IEEE 5 INT C COMP
  • [6] D'souza FJ, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), P647, DOI 10.1109/CCAA.2017.8229881
  • [7] CRYPTOGRAPHY AND COMPUTER PRIVACY
    FEISTEL, H
    [J]. SCIENTIFIC AMERICAN, 1973, 228 (05) : 15 - 23
  • [8] Grassl M., 2016, P INT C POSTQ CRYPT
  • [9] Grover L. K., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P212, DOI 10.1145/237814.237866
  • [10] Quantum Computing
    Hevia, Jose Luis
    Peterssen, Guido
    Ebert, Christof
    Piattini, Mario
    [J]. IEEE SOFTWARE, 2021, 38 (05) : 7 - 15