Quantum meet-in-the-middle attack on Feistel construction

被引:0
|
作者
Yinsong Xu
Zheng Yuan
机构
[1] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology
[2] Advanced Cryptography and System Security Key Laboratory of Sichuan Province,undefined
[3] Beijing Electronic Science and Technology Institute,undefined
关键词
Quantum meet-in-the-middle attack; Feistel construction; Quanutm claw finding algorithm; Q1 model;
D O I
暂无
中图分类号
学科分类号
摘要
Inspired by Hosoyamada and Sasaki (in: International conference on security and cryptography for networks, pp 386–403. Springer, 2018), we propose a new quantum meet-in-the-middle (QMITM) attack on r-round (r≥7\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$r \ge 7$$\end{document}) Feistel construction to reduce the time complexity, which is based on Guo et al. (Des Codes Cryptogr 80(3):587–618, 2016) classical meet-in-the-middle (MITM) attack. In our attack, we adjust the size of truncated differentials to balance the complexities between constructing the tables and querying firstly and introduce a quantum claw finding algorithm to solve the collision search problem in classical MITM attack. The total time complexities of our attack are only O(22n/3·n)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O({2^{2n/3}} \cdot n)$$\end{document}, O(219n/24·n)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O({2^{19n/24}} \cdot n)$$\end{document} and O(2(r-5)n/4·n)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O({2^{(r - 5)n/4}} \cdot n)$$\end{document}, when r=7\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$r = 7$$\end{document}, r=8\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$r = 8$$\end{document} and r>8\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$r > 8$$\end{document}, lower than classical and quantum attacks. Moreover, our attack belongs to Q1 model and is more practical than other quantum attacks.
引用
收藏
相关论文
共 50 条
  • [21] A meet-in-the-middle attack on reduced-round ARIA
    Tang, Xuehai
    Sun, Bing
    Li, Ruilin
    Li, Chao
    Yin, Juhua
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) : 1685 - 1692
  • [22] Quantum Demiric-Selcuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions
    Hosoyamada, Akinori
    Sasaki, Yu
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 386 - 403
  • [23] A Meet-in-the-Middle Attack on 8-Round AES
    Demirci, Hueseyin
    Selcuk, Ali Aydin
    FAST SOFTWARE ENCRYPTION, 2008, 5086 : 116 - +
  • [24] New Demiric-Selcuk meet-in-the-middle attacks on Misty and Feistel schemes
    Zou, Jian
    Huang, Kairong
    Zhu, Min
    Zou, Hongkai
    Luo, Yiyuan
    Liu, Qian
    QUANTUM INFORMATION PROCESSING, 2024, 23 (04)
  • [25] A new meet-in-the-middle attack on the IDEA block cipher
    Demirci, H
    Selçuk, AA
    Türe, E
    SELECTED AREAS IN CRYPTOGRAPHY, 2004, 3006 : 117 - 129
  • [26] Differential Fault Attack and Meet-in-the-Middle Attack on Block Cipher LED
    Liu, Feng
    Liu, Xuan
    Meng, Shuai
    ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 529 - 532
  • [27] Automatic Demirci-Selcuk Meet-In-The-Middle Attack On SIMON
    Lv, Yin
    Shi, Danping
    Guo, Yi
    Chen, Qiu
    Hu, Lei
    Guo, Zihui
    COMPUTER JOURNAL, 2023, 66 (12): : 3052 - 3068
  • [28] Side-Channel Attack Using Meet-in-the-Middle Technique
    Kim, Jongsung
    Hong, Seokhie
    COMPUTER JOURNAL, 2010, 53 (07): : 934 - 938
  • [29] Parallelizing the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
    Wunderer, Thomas
    Burger, Michael
    Giang Nam Nguyen
    2018 21ST IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2018), 2018, : 185 - 193
  • [30] 3-subset meet-in-the-middle attack on block cipher TWIS
    Zheng, Y.-F., 1600, Editorial Board of Journal on Communications (35):