Time-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2

被引:60
作者
Kim, Panjin [1 ]
Han, Daewan [1 ]
Jeong, Kyung Chul [1 ]
机构
[1] Natl Secur Res Inst, Daejeon 34044, South Korea
关键词
Quantum circuit; Grover; Parallelization; Resource estimates; AES; SHA-2; CIRCUITS;
D O I
10.1007/s11128-018-2107-3
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Performance of cryptanalytic quantum search algorithms is mainly inferred from query complexity which hides overhead induced by an implementation. To shed light on quantitative complexity analysis removing hidden factors, we provide a framework for estimating time-space complexity, with carefully accounting for characteristics of target cryptographic functions. Processor and circuit parallelization methods are taken into account, resulting in the time-space trade-off curves in terms of depth and qubit. The method guides how to rank different circuit designs in order of their efficiency. The framework is applied to representative cryptosystems NIST referred to as a guideline for security parameters, reassessing the security strengths of AES and SHA-2.
引用
收藏
页数:39
相关论文
共 56 条
[1]   Improved simulation of stabilizer circuits [J].
Aaronson, S ;
Gottesman, D .
PHYSICAL REVIEW A, 2004, 70 (05) :052328-1
[2]   Quantum reversible circuit of AES-128 [J].
Almazrooie, Mishal ;
Samsudin, Azman ;
Abdullah, Rosni ;
Mutter, Kussay N. .
QUANTUM INFORMATION PROCESSING, 2018, 17 (05)
[3]   Quantum walk algorithm for element distinctness [J].
Ambainis, Andris .
SIAM JOURNAL ON COMPUTING, 2007, 37 (01) :210-239
[4]  
Amento B, 2013, QUANTUM INF COMPUT, V13, P631
[5]  
Amy Matthew, 2017, Selected Areas in Cryptography - SAC 2016. 23rd International Conference. Revised Selected Papers: LNCS 10532, P317, DOI 10.1007/978-3-319-69453-5_18
[6]   A Meet-in-the-Middle Algorithm for Fast Synthesis of Depth-Optimal Quantum Circuits [J].
Amy, Matthew ;
Maslov, Dmitri ;
Mosca, Michele ;
Roetteler, Martin .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2013, 32 (06) :818-830
[7]  
[Anonymous], FIPS PUB
[8]  
[Anonymous], 2004, ARXIVQUANTPH0410184
[9]  
[Anonymous], POSTQ CRYPT CALL PRO
[10]  
[Anonymous], 2008, Post Quantum Cryptography