A note on quantum related-key attacks
From MaRDI portal
Publication:458382
DOI10.1016/J.IPL.2014.08.009zbMATH Open1358.94076arXiv1306.2301OpenAlexW2148184032MaRDI QIDQ458382FDOQ458382
Authors: Martin Roetteler, Rainer Steinwandt
Publication date: 7 October 2014
Published in: Information Processing Letters (Search for Journal in Brave)
Abstract: In a basic related-key attack against a block cipher, the adversary has access to encryptions under keys that differ from the target key by bit-flips. In this short note we show that for a quantum adversary such attacks are quite powerful: if the secret key is (i) uniquely determined by a small number of plaintext-ciphertext pairs, (ii) the block cipher can be evaluated efficiently, and (iii) a superposition of related keys can be queried, then the key can be extracted efficiently.
Full work available at URL: https://arxiv.org/abs/1306.2301
Recommendations
- A quantum related-key attack based on the Bernstein-Vazirani algorithm
- Quantum attacks on public-key cryptosystems
- scientific article
- On quantum related-key attacks on iterated Even-Mansour ciphers
- A note on quantum security for post-quantum cryptography
- Attacks on fixed apparatus quantum key distribution schemes
- Attacks on quantum key distribution protocols that employ non-ITS authentication
- Analysis of attacks onto quantum public key distribution system
- Information Security and Cryptology
- Restricted attacks on semi-quantum key distribution protocols
Cryptography (94A60) Quantum computation (81P68) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Title not available (Why is that?)
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Title not available (Why is that?)
- Title not available (Why is that?)
- Logical Reversibility of Computation
- Title not available (Why is that?)
- Introduction to post-quantum cryptography
- On cipher-dependent related-key attacks in the ideal-cipher model
- Random oracles in a quantum world
- Quantum addition circuits and unbounded fan-out
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- A logarithmic-depth quantum carry-lookahead adder
- Title not available (Why is that?)
- CHOSEN-KEY ATTACKS ON A BLOCK CIPHER
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (17)
- Hidden shift quantum cryptanalysis and implications
- Quantum reversible circuit of AES-128
- Sponge-based authenticated encryption: security against quantum attackers
- On quantum ciphertext indistinguishability, recoverability, and OAEP
- QCB is blindly unforgeable
- Quantum cryptanalysis on contracting Feistel structures and observation on related-key settings
- Quantum circuit implementation and resource analysis of LBlock and LiCi
- Title not available (Why is that?)
- A quantum distinguisher for 7/8-round SMS4 block cipher
- On Quantum Distinguishers for Type-3 Generalized Feistel Network Based on Separability
- Quantum indistinguishability for public key encryption
- Query complexity of generalized Simon's problem
- Breaking the Quadratic Barrier: Quantum Cryptanalysis of Milenage, Telecommunications’ Cryptographic Backbone
- Tight bounds for Simon's algorithm
- QCB: efficient quantum-secure authenticated encryption
- A quantum related-key attack based on the Bernstein-Vazirani algorithm
- Quantum differential and linear cryptanalysis
This page was built for publication: A note on quantum related-key attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q458382)