Breaking Symmetric Cryptosystems Using Quantum Period Finding

From MaRDI portal
Publication:2829216

DOI10.1007/978-3-662-53008-5_8zbMath1391.94766arXiv1602.05973OpenAlexW2284942299MaRDI QIDQ2829216

Anthony Leverrier, Gaëtan Leurent, María Naya-Plasencia, M. A. Kaplan

Publication date: 27 October 2016

Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/1602.05973




Related Items (90)

On tight quantum security of HMAC and NMAC in the quantum random oracle modelNoisy Simon period findingOn Quantum Distinguishers for Type-3 Generalized Feistel Network Based on SeparabilityQuantum algorithms for the \(k\)-XOR problemHidden shift quantum cryptanalysis and implicationsTight bounds for Simon's algorithmTowards quantum large-scale password guessing on real-world distributionsQuantum cryptanalysis on contracting Feistel structures and observation on related-key settingsEvaluation of quantum cryptanalysis on SPECKPholkos -- efficient large-state tweakable block ciphers from the AES round functionQuantum reversible circuit of AES-128Quantum differential and linear cryptanalysisBeyond quadratic speedups in quantum attacks on symmetric schemesPost-quantum security of the Even-Mansour cipherGeneral linear group action on tensors: a candidate for post-quantum cryptographyEfficient quantum algorithms related to autocorrelation spectrumQuantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256Quantum attacks on some Feistel block ciphersEfficient slide attacksUsing Bernstein-Vazirani algorithm to attack block ciphersQuantum security analysis of RoccaNew results on quantum boomerang attacksQuantum meet-in-the-middle attack on Feistel constructionBreaking symmetric cryptosystems using the offline distributed Grover-Meets-Simon algorithmQuantum key recovery attacks on tweakable Even-Mansour ciphersBlock encryption of quantum messagesQCB is blindly unforgeableImproved attacks against reduced-round WhirlwindQuantum circuit implementation and resource analysis of LBlock and LiCiFinding many collisions via reusable quantum walks. Application to lattice sievingComplete analysis of Simon's quantum algorithm with additional collisionsTriangulating rebound attack on AES-like hashingA quantum related-key attack based on the Bernstein-Vazirani algorithmGrover on \(SIMON\)Post-quantum security on the Lai-Massey schemeQuantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networksQuantum impossible differential attacks: applications to AES and SKINNYQuantum algorithms for the Goldreich-Levin learning problemA quantum distinguisher for 7/8-round SMS4 block cipherOptimizing the depth of quantum implementations of linear layersSynthesizing quantum circuits of AES with lower \(T\)-depth and less qubitsComments on ``Efficient classical simulation of the Deutsch-Jozsa and Simon's algorithmsQuantum key-recovery attack on Feistel constructions: Bernstein-Vazirani meet Grover algorithmQuantum attacks against BBB secure PRFs or MACs built from public random permutationsAutomatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentialsQuantum linearization attacksQCB: efficient quantum-secure authenticated encryptionQuantum resource estimation for FSR based symmetric ciphers and related Grover's attacksApplications of Simon's algorithm in quantum attacks on Feistel variantsSimon's algorithm and symmetric crypto: generalizations and automatized applicationsQuantum attacks on Lai-Massey structureSponge-based authenticated encryption: security against quantum attackersOn quantum ciphertext indistinguishability, recoverability, and OAEPQuantum attacks on beyond-birthday-bound MACsQuantum attacks on PRFs based on public random permutationsOn security notions for encryption in a quantum worldRelated-key differential cryptanalysis of GMiMC used in post-quantum signaturesOn the post-quantum security of classical authenticated encryption schemesQuantum linear key-recovery attacks using the QFTQuantum search for scaled hash function preimagesQuantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithmsQuantum collision attacks on AES-like hashing with low quantum random access memoriesQuantum key-length extensionRelationships between quantum IND-CPA notionsQuantum algorithm design: techniques and applicationsQuantum attacks on sum of Even-Mansour pseudorandom functionsQuantum spin half algebra and generalized Megrelishvili protocol for confidentiality of digital imagesQuantum key-recovery on full AEZQuantum key search with side channel adviceBreaking LWC candidates: sESTATE and Elephant in quantum settingBreaking tweakable enciphering schemes using Simon's algorithmDispelling myths on superposition attacks: formal security model and attack analysesQuery complexity of generalized Simon's problemQuantum-access-secure message authentication via blind-unforgeabilityOn Quantum Chosen-Ciphertext Attacks and Learning with ErrorsBreaking Symmetric Cryptosystems Using Quantum Period FindingSemantic Security and Indistinguishability in the Quantum WorldQuantum algorithms for learning Walsh spectra of multi-output Boolean functionsQuantum cryptographic property testing of multi-output Boolean functionsQuantum generic attacks on key-alternating Feistel ciphers for shorter keysA new post-quantum voting protocol based on physical lawsQuantum zero correlation linear cryptanalysisA cluster-based networking approach for large-scale and wide-area quantum key agreementImproved BV-based quantum attack on block ciphersПростейшие надгруппы регулярных представлений неабелевых $2$-групп с циклической подгруппой индекса $2$Quantum-Secure Symmetric-Key Cryptography Based on Hidden ShiftsAttacks on beyond-birthday-bound MACs in the quantum settingQuantum indistinguishability for public key encryptionQuantum Demiric-Selcuk meet-in-the-middle attacks on reduced-round AESFinding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound


Uses Software


Cites Work


This page was built for publication: Breaking Symmetric Cryptosystems Using Quantum Period Finding