Quantum attacks on generalized Feistel networks based on the strong-weak separability

被引:3
|
作者
Xu, Ying [1 ]
Du, Xiaoni [1 ,2 ,3 ]
Jia, Meichun [1 ]
Wang, Xiangyu [1 ]
Zou, Jian [4 ,5 ]
机构
[1] Northwest Normal Univ, Coll Math & Stat, Anning East Rd, Lanzhou 730070, Gansu, Peoples R China
[2] Northwest Normal Univ, Key Lab Cryptog & Data Analyt, Anning East, Lanzhou 730070, Gansu, Peoples R China
[3] Northwest Normal Univ, Gansu Prov Res Ctr Basic Disciplines Math & Stat, Anning East, Lanzhou 730070, Gansu, Peoples R China
[4] Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350108, Fujian, Peoples R China
[5] Fuzhou Univ, Key Lab Informat Secur Network Syst, Fuzhou 350108, Fujian, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum cryptanalysis; 4F-function structure; 2F-function structure; Strong-weak separability; Simon's algorithm; Grover's algorithm;
D O I
10.1007/s11128-023-04135-6
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Generalized Feistel networks are important components of symmetric ciphers, and detailed security evaluations in the quantum setting remain to be explored. In this paper, based on the strong-weak separability of certain branch output function, we present polynomial-time quantum distinguishers for 4F-function and 2F-function structures in quantum chosen-plaintext attack setting for the first time, and then quantum key-recovery attacks are achieved through Grover-meet-Simon algorithm, respectively. Under the condition of the semi-strong separability, firstly, we give a quantum distinguisher on 8-round 4F-function structure, from which we carry out a 12-round quantum key-recovery attack to guess 10n-bit subkey, whose time complexities gain a factor of 2(5n). When attacking r >12 rounds, we can recover 4(r-12)n+10n-bit subkey in time 24(r-12)n+10m/2. Secondly, we show a quantum distinguisher on 5-round 2F-function structure, and a 7-round quantum key-recovery attack is performed on it, which can recover 3n-bit subkey in time 2(1.5n). When r>7, 2(r-7)n+3n-bit subkey can be recovered with time complexities by a factor of 22(r-7)n+3n/2. Furthermore, based on the weak separability, a 6-round quantum distinguisher for 2F-function structure is constructed, and an 8-round quantum key-recovery attack is achieved, and the time complexity is 22(r-8)n+3n/2 when r>8. The results show that the time complexity of each attack scheme we proposed is much better than that of Grover's brute force search.
引用
收藏
页数:25
相关论文
共 42 条
  • [1] Quantum attacks on generalized Feistel networks based on the strong–weak separability
    Ying Xu
    Xiaoni Du
    Meichun Jia
    Xiangyu Wang
    Jian Zou
    Quantum Information Processing, 22
  • [2] On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability
    Hodzic, Samir
    Ramkilde, Lars Knudsen
    Kidmose, Andreas Brasen
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2020, 2020, 12100 : 461 - 480
  • [3] Generalized birthday attacks on unbalanced Feistel networks
    Jutla, CS
    ADVANCES IN CRYPTOLOGY - CRYPTO'98, 1998, 1462 : 186 - 199
  • [4] Improved Attacks on Extended Generalized Feistel Networks
    Nachef, Valerie
    Marriere, Nicolas
    Volte, Emmanuel
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 562 - 572
  • [5] Strong-weak coupling duality symmetry in quantum mechanics
    Dutra, ADS
    GROUP 21 - PHYSICAL APPLICATIONS AND MATHEMATICAL ASPECTS OF GEOMETRY, GROUPS, AND ALGEBRA, VOLS 1 AND 2, 1997, : 481 - 483
  • [6] Quantum Attacks on Type-1 Generalized Feistel Schemes
    Sun, Hong-Wei
    Cai, Bin-Bin
    Qin, Su-Juan
    Wen, Qiao-Yan
    Gao, Fei
    ADVANCED QUANTUM TECHNOLOGIES, 2023, 6 (10)
  • [7] Distributed Stabilization of Heterogeneous MASs in Uncertain Strong-Weak Competition Networks
    Hu, Hong-Xiang
    Wen, Guanghui
    Yu, Xinghuo
    Wu, Zheng-Guang
    Huang, Tingwen
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (03): : 1755 - 1767
  • [8] Quantum Attacks on Type-3 Generalized Feistel Scheme and Unbalanced Feistel Scheme with Expanding Functions
    ZHANG Zhongya
    WU Wenling
    SUI Han
    WANG Bolin
    ChineseJournalofElectronics, 2023, 32 (02) : 209 - 216
  • [9] Quantum Attacks on Type-3 Generalized Feistel Scheme and Unbalanced Feistel Scheme with Expanding Functions
    Zhang, Zhongya
    Wu, Wenling
    Sui, Han
    Wang, Bolin
    CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (02) : 209 - 216
  • [10] Quantum claw-finding attacks on 5-round Feistel structure and generalized Feistel schemes
    Feng, Xiaoning
    Wu, Hongyu
    Zhang, Kejia
    Sun, Hongwei
    QUANTUM INFORMATION PROCESSING, 2025, 24 (02)