{"title":"量子密钥恢复攻击可调整的Even-Mansour密码","authors":"Ping Zhang, Yiyuan Luo","doi":"10.1007/s11128-023-04098-8","DOIUrl":null,"url":null,"abstract":"<div><p>As tweakable block ciphers from public permutations, tweakable Even–Mansour ciphers are widely used in disk sector encryption and data storage encryption. With the rapid improvement of computing power, especially the development of quantum computing technology and quantum computers, the quantum security of tweakable Even–Mansour ciphers should be concerned and studied. This paper focuses on the security of tweakable Even–Mansour ciphers in the quantum setting. For one-round tweakable Even–Mansour cipher, we give its quantum circuit, present a quantum key recovery attack in polynomial time by Simon’s algorithm and show the concrete resource estimation. For two-round tweakable Even–Mansour cipher, we present a better quantum key recovery attack by BHT-meets-Simon algorithm than that by Grover-meets-Simon algorithm from a new perspective of variable tweaks and show the concrete resource estimation. Finally, we generalize to <i>r</i>-round tweakable Even–Mansour cipher and present a quantum key recovery attack by combining Grover’s algorithm and Simon’s algorithm. Our work is of great importance. We use BHT-meets-Simon algorithm to achieve better quantum key recovery attacks than Grover-meets-Simon algorithm for the first time.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"22 9","pages":""},"PeriodicalIF":2.2000,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Quantum key recovery attacks on tweakable Even–Mansour ciphers\",\"authors\":\"Ping Zhang, Yiyuan Luo\",\"doi\":\"10.1007/s11128-023-04098-8\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>As tweakable block ciphers from public permutations, tweakable Even–Mansour ciphers are widely used in disk sector encryption and data storage encryption. With the rapid improvement of computing power, especially the development of quantum computing technology and quantum computers, the quantum security of tweakable Even–Mansour ciphers should be concerned and studied. This paper focuses on the security of tweakable Even–Mansour ciphers in the quantum setting. For one-round tweakable Even–Mansour cipher, we give its quantum circuit, present a quantum key recovery attack in polynomial time by Simon’s algorithm and show the concrete resource estimation. For two-round tweakable Even–Mansour cipher, we present a better quantum key recovery attack by BHT-meets-Simon algorithm than that by Grover-meets-Simon algorithm from a new perspective of variable tweaks and show the concrete resource estimation. Finally, we generalize to <i>r</i>-round tweakable Even–Mansour cipher and present a quantum key recovery attack by combining Grover’s algorithm and Simon’s algorithm. Our work is of great importance. We use BHT-meets-Simon algorithm to achieve better quantum key recovery attacks than Grover-meets-Simon algorithm for the first time.</p></div>\",\"PeriodicalId\":746,\"journal\":{\"name\":\"Quantum Information Processing\",\"volume\":\"22 9\",\"pages\":\"\"},\"PeriodicalIF\":2.2000,\"publicationDate\":\"2023-09-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Quantum Information Processing\",\"FirstCategoryId\":\"101\",\"ListUrlMain\":\"https://link.springer.com/article/10.1007/s11128-023-04098-8\",\"RegionNum\":3,\"RegionCategory\":\"物理与天体物理\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"PHYSICS, MATHEMATICAL\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Quantum Information Processing","FirstCategoryId":"101","ListUrlMain":"https://link.springer.com/article/10.1007/s11128-023-04098-8","RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"PHYSICS, MATHEMATICAL","Score":null,"Total":0}
Quantum key recovery attacks on tweakable Even–Mansour ciphers
As tweakable block ciphers from public permutations, tweakable Even–Mansour ciphers are widely used in disk sector encryption and data storage encryption. With the rapid improvement of computing power, especially the development of quantum computing technology and quantum computers, the quantum security of tweakable Even–Mansour ciphers should be concerned and studied. This paper focuses on the security of tweakable Even–Mansour ciphers in the quantum setting. For one-round tweakable Even–Mansour cipher, we give its quantum circuit, present a quantum key recovery attack in polynomial time by Simon’s algorithm and show the concrete resource estimation. For two-round tweakable Even–Mansour cipher, we present a better quantum key recovery attack by BHT-meets-Simon algorithm than that by Grover-meets-Simon algorithm from a new perspective of variable tweaks and show the concrete resource estimation. Finally, we generalize to r-round tweakable Even–Mansour cipher and present a quantum key recovery attack by combining Grover’s algorithm and Simon’s algorithm. Our work is of great importance. We use BHT-meets-Simon algorithm to achieve better quantum key recovery attacks than Grover-meets-Simon algorithm for the first time.
期刊介绍:
Quantum Information Processing is a high-impact, international journal publishing cutting-edge experimental and theoretical research in all areas of Quantum Information Science. Topics of interest include quantum cryptography and communications, entanglement and discord, quantum algorithms, quantum error correction and fault tolerance, quantum computer science, quantum imaging and sensing, and experimental platforms for quantum information. Quantum Information Processing supports and inspires research by providing a comprehensive peer review process, and broadcasting high quality results in a range of formats. These include original papers, letters, broadly focused perspectives, comprehensive review articles, book reviews, and special topical issues. The journal is particularly interested in papers detailing and demonstrating quantum information protocols for cryptography, communications, computation, and sensing.