Quantum meet-in-the-middle attack on Feistel construction

被引:0
|
作者
Yinsong Xu
Zheng Yuan
机构
[1] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology
[2] Advanced Cryptography and System Security Key Laboratory of Sichuan Province,undefined
[3] Beijing Electronic Science and Technology Institute,undefined
关键词
Quantum meet-in-the-middle attack; Feistel construction; Quanutm claw finding algorithm; Q1 model;
D O I
暂无
中图分类号
学科分类号
摘要
Inspired by Hosoyamada and Sasaki (in: International conference on security and cryptography for networks, pp 386–403. Springer, 2018), we propose a new quantum meet-in-the-middle (QMITM) attack on r-round (r≥7\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$r \ge 7$$\end{document}) Feistel construction to reduce the time complexity, which is based on Guo et al. (Des Codes Cryptogr 80(3):587–618, 2016) classical meet-in-the-middle (MITM) attack. In our attack, we adjust the size of truncated differentials to balance the complexities between constructing the tables and querying firstly and introduce a quantum claw finding algorithm to solve the collision search problem in classical MITM attack. The total time complexities of our attack are only O(22n/3·n)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O({2^{2n/3}} \cdot n)$$\end{document}, O(219n/24·n)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O({2^{19n/24}} \cdot n)$$\end{document} and O(2(r-5)n/4·n)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O({2^{(r - 5)n/4}} \cdot n)$$\end{document}, when r=7\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$r = 7$$\end{document}, r=8\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$r = 8$$\end{document} and r>8\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$r > 8$$\end{document}, lower than classical and quantum attacks. Moreover, our attack belongs to Q1 model and is more practical than other quantum attacks.
引用
收藏
相关论文
共 50 条
  • [31] Reduced memory meet-in-the-middle attack against the NTRU private key
    van Vredendaal, Christine
    LMS JOURNAL OF COMPUTATION AND MATHEMATICS, 2016, 19 : 43 - 57
  • [32] A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE
    Cheon, Jung Hee
    Hhan, Minki
    Hong, Seungwan
    Son, Yongha
    IEEE ACCESS, 2019, 7 : 89497 - 89506
  • [33] A meet-in-the-middle collision attack against the new FORK-256
    Saarinen, Markku-Juhani O.
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 10 - 17
  • [34] A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack
    Wunderer, Thomas
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2019, 13 (01) : 1 - 26
  • [35] A hybrid lattice-reduction and meet-in-the-middle attack against NTRU
    Howgrave-Graham, Nick
    ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 150 - 169
  • [36] Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function
    Moon, Dukjae
    Hong, Deukjo
    Kwon, Daesung
    Hong, Seokhie
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (08) : 1379 - 1389
  • [37] Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
    Li, Ji
    Isobe, Takanori
    Shibutani, Kyoji
    FAST SOFTWARE ENCRYPTION (FSE 2012), 2012, 7549 : 264 - 286
  • [38] Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
    Zhang, Kai
    Lai, Xuejia
    Wang, Lei
    Guan, Jie
    Hu, Bin
    Wang, Senpeng
    Shi, Tairong
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (9) : 2845 - 2878
  • [39] Differential Meet-In-The-Middle Cryptanalysis
    Boura, Christina
    David, Nicolas
    Derbez, Patrick
    Leander, Gregor
    Naya-Plasencia, Maria
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT III, 2023, 14083 : 240 - 272
  • [40] Meet-in-the-middle Cryptanalysis of IVLBC
    Uchiyama, Yuki
    Igarashi, Yasutaka
    2024 IEEE TENTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS, ICCE 2024, 2024, : 445 - 450