Quantum meet-in-the-middle attack on Feistel construction

被引:0
|
作者
Yinsong Xu
Zheng Yuan
机构
[1] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology
[2] Advanced Cryptography and System Security Key Laboratory of Sichuan Province,undefined
[3] Beijing Electronic Science and Technology Institute,undefined
关键词
Quantum meet-in-the-middle attack; Feistel construction; Quanutm claw finding algorithm; Q1 model;
D O I
暂无
中图分类号
学科分类号
摘要
Inspired by Hosoyamada and Sasaki (in: International conference on security and cryptography for networks, pp 386–403. Springer, 2018), we propose a new quantum meet-in-the-middle (QMITM) attack on r-round (r≥7\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$r \ge 7$$\end{document}) Feistel construction to reduce the time complexity, which is based on Guo et al. (Des Codes Cryptogr 80(3):587–618, 2016) classical meet-in-the-middle (MITM) attack. In our attack, we adjust the size of truncated differentials to balance the complexities between constructing the tables and querying firstly and introduce a quantum claw finding algorithm to solve the collision search problem in classical MITM attack. The total time complexities of our attack are only O(22n/3·n)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O({2^{2n/3}} \cdot n)$$\end{document}, O(219n/24·n)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O({2^{19n/24}} \cdot n)$$\end{document} and O(2(r-5)n/4·n)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$O({2^{(r - 5)n/4}} \cdot n)$$\end{document}, when r=7\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$r = 7$$\end{document}, r=8\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$r = 8$$\end{document} and r>8\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$r > 8$$\end{document}, lower than classical and quantum attacks. Moreover, our attack belongs to Q1 model and is more practical than other quantum attacks.
引用
收藏
相关论文
共 50 条
  • [41] Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
    Kai Zhang
    Xuejia Lai
    Lei Wang
    Jie Guan
    Bin Hu
    Senpeng Wang
    Tairong Shi
    Designs, Codes and Cryptography, 2023, 91 : 2845 - 2878
  • [42] Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE
    Biryukov, Alex
    Derbez, Patrick
    Perrin, Leo
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 3 - 27
  • [43] Quantum mechanical meet-in-the-middle search algorithm for Triple-DES
    Zhong PuCha
    Bao WanSu
    CHINESE SCIENCE BULLETIN, 2010, 55 (03): : 321 - 325
  • [44] Quantum mechanical meet-in-the-middle search algorithm for Triple-DES
    ZHONG PuCha & BAO WanSu Institute of Electronic Technology
    Science Bulletin, 2010, (03) : 321 - 325
  • [45] Quantum mechanical meet-in-the-middle search algorithm for Triple-DES
    ZHONG PuCha BAO WanSu Institute of Electronic Technology the PLA Information Engineering University Zhengzhou China
    Chinese Science Bulletin, 2010, 55 (03) : 321 - 325
  • [46] The higher-order meet-in-the-middle attack and its application to the Camellia block cipher
    Lu, Jiqiang
    Wei, Yongzhuang
    Kim, Jongsung
    Pasalic, Enes
    THEORETICAL COMPUTER SCIENCE, 2014, 527 : 102 - 122
  • [47] Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
    Jiqiang Lu
    Wenchang Zhou
    Designs, Codes and Cryptography, 2024, 92 : 957 - 973
  • [48] Meet-in-the-Middle Attack on 11-Round 3D Block Cipher
    Li, Rongjia
    Jin, Chenhui
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (01) : 19 - 28
  • [49] Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64
    Bo Zhu
    Guang Gong
    Cryptography and Communications, 2014, 6 : 313 - 333
  • [50] Differential fault analysis and meet-in-the-middle attack on the block cipher KATAN32
    Zhang W.-Y.
    Liu F.
    Liu X.
    Meng S.
    Journal of Shanghai Jiaotong University (Science), 2013, Shanghai Jiaotong University (18): : 147 - 152