Maintaining Secure Level on Symmetric Encryption under Quantum Attack

被引:2
作者
Shiu, Hung [1 ]
Yang, Chao-Tung [2 ,3 ]
Tsai, Yun-Ru [2 ]
Lin, Wei-Chung [1 ]
Lai, Chun-Ming [2 ]
机构
[1] Natl Taipei Univ, Dept Comp Sci & Informat Engn, New Taipei City 237, Taiwan
[2] Tunghai Univ, Dept Comp Sci, Taichung 407, Taiwan
[3] Tunghai Univ, Res Ctr Smart Sustainable Circular Econ, Taichung 407, Taiwan
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 11期
关键词
quantum computing; Shor's algorithm; Grover's algorithm; advanced encryption standard; strict avalanche criterion; Rijndael algorithm;
D O I
10.3390/app13116734
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Quantum computing is currently being researched in many countries, and if implemented in the near future, it may pose a threat to existing encryption standards. In the quantum computer environment, asymmetric encryption can be solved by Shor's Algorithm in polynomial time, and the difficulty of breaking symmetric encryption using brute force is reduced from N times to square root N times by Grover's Algorithm. We take the Advanced Encryption Standard as the theme and increase the key length from the original standard 192 bits and 256 bits to 384 bits and 512 bits, respectively, in order to maintain the security level of AES 192/256 under the environment of quantum computing, so we propose the key schedule of AES 384/512, and write the software in C++ on FPGA. The experimental results show that our scheme can achieve Level III and Level V security levels in a quantum computer attack environment. In addition to increasing the length of the key, we use the LUT method in the process of writing SubBytes to replace the array and speed up the computation to optimize the execution speed. In addition, the proposed scheme is still based on 128-bit computing blocks, rather than computing blocks in larger blocks.
引用
收藏
页数:14
相关论文
共 29 条
  • [11] Hu F., 2022, P 2022 INT C CYB WAR
  • [12] Joshi A., 2015, P IEEE INT C ENG TEC
  • [13] Khose PN, 2015, 2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC)
  • [14] Kumar K., 2022, P 2022 5 INT C CONT
  • [15] Mattsson J.P., 2021, arXiv
  • [16] Moh'd A., 2011, 2011 7th International Conference on Information Assurance and Security (IAS), P292, DOI 10.1109/ISIAS.2011.6122835
  • [17] Nadjia A., 2015, P INT C EL ENG ICEE
  • [18] NIST, 2001, ANN ADV ENCR STAND A, P5
  • [19] Pammu A.A., 2016, P INT C INF SYST ENG
  • [20] Rahim U., 2022, P 2022 32 INT TEL NE