Breaking Symmetric Cryptosystems Using Quantum Period Finding

被引:208
作者
Kaplan, Marc [1 ,2 ]
Leurent, Gaetan [3 ]
Leverrier, Anthony [3 ]
Naya-Plasencia, Maria [3 ]
机构
[1] Telecom ParisTech, LTCI, 23 Ave Italie, F-75214 Paris 13, France
[2] Univ Edinburgh, Sch Informat, 10 Crichton St, Edinburgh EH8 9AB, Midlothian, Scotland
[3] Inria Paris, Paris, France
来源
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II | 2016年 / 9815卷
基金
英国工程与自然科学研究理事会; 欧盟地平线“2020”;
关键词
Post-quantum cryptography; Symmetric cryptography; Quantum attacks; Block ciphers; Modes of operation; Slide attack; ENCRYPTION; CIPHER; PERFORMANCE; SECURITY; MODE;
D O I
10.1007/978-3-662-53008-5_8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to Shor's algorithm, quantum computers are a severe threat for public key cryptography. This motivated the cryptographic community to search for quantum-safe solutions. On the other hand, the impact of quantum computing on secret key cryptography is much less understood. In this paper, we consider attacks where an adversary can query an oracle implementing a cryptographic primitive in a quantum superposition of different states. This model gives a lot of power to the adversary, but recent results show that it is nonetheless possible to build secure cryptosystems in it. We study applications of a quantum procedure called Simon's algorithm (the simplest quantum period finding algorithm) in order to attack symmetric cryptosystems in this model. Following previous works in this direction, we show that several classical attacks based on finding collisions can be dramatically sped up using Simon's algorithm: finding a collision requires Omega(2(n/2)) queries in the classical setting, but when collisions happen with some hidden periodicity, they can be found with only O(n) queries in the quantum model. We obtain attacks with very strong implications. First, we show that the most widely used modes of operation for authentication and authenticated encryption (e.g. CBC-MAC, PMAC, GMAC, GCM, and OCB) are completely broken in this security model. Our attacks are also applicable to many CAESAR candidates: CLOC, AEZ, COPA, OTR, POET, OMD, and Minalpher. This is quite surprising compared to the situation with encryption modes: Anand et al. show that standard modes are secure with a quantum-secure PRF. Second, we show that Simon's algorithm can also be applied to slide attacks, leading to an exponential speed-up of a classical symmetric cryptanalysis technique in the quantum model.
引用
收藏
页码:207 / 237
页数:31
相关论文
共 50 条
[1]  
Abed F., CID AND RECHBERGER, P205
[2]  
Alagic G., 2016, ARXIV160201441
[3]   Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation [J].
Anand, Mayuresh Vivekanand ;
Targhi, Ehsan Ebrahimi ;
Tabia, Gelo Noel ;
Unruh, Dominique .
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 :44-63
[4]  
Andreeva E, 2013, LECT NOTES COMPUT SC, V8269, P424, DOI 10.1007/978-3-642-42033-7_22
[5]  
[Anonymous], 2016, ARXIV160307856
[6]   The security of the cipher block chaining message authentication code [J].
Bellare, M ;
Kilian, J ;
Rogaway, P .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2000, 61 (03) :362-399
[7]  
Bernstein DJ., 2009, POSTQUANTUM CRYPTOGR, P1, DOI [DOI 10.1007/978-3-540-88702-7, 10.1007/978-3-540-88702-7, DOI 10.1007/978-3-540-88702-71, 10.1007/978-3-540-88702-7_1, DOI 10.1007/978-3-540-88702-7_1]
[8]  
Biryukov A, 1999, LECT NOTES COMPUT SC, V1636, P245
[9]  
Biryukov A, 2000, LECT NOTES COMPUT SC, V1807, P589
[10]  
Black J, 2002, LECT NOTES COMPUT SC, V2332, P384