First, we convert the classical advanced slide attacks (introduced by Biryukov and Wagner) to a quantum one, that gains an exponential speed-up in time complexity. Thus, we could break 2/4K-Feistel and 2/4K-DES in polynomial time. Second, we give a new quantum key-recovery attack on ...
The quantum security of lightweight block ciphers is receiving more and more attention. However, the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search, while the quantum attacks combined with classical cryptanalysis methods haven’t been well studied. I...
Quantum attacks on some feistel block ciphers Post-quantum cryptography has attracted much attention from worldwide cryptologists. However, most research works are related to public-key cryptosystem du... X Dong,B Dong,X Wang - 《Designs Codes & Cryptography》 被引量: 0发表: 2020年 加载更多来...
However, there are no key-recovery attacks that are observed on Feistel ciphers in the qCPA setting. In this study, we consider the quantum key-recovery attack on Feistel schemes for the very first time. As depicted in Figure 1, in the iith round of the Feistel structure, the nn-bit...
attacks, the corresponding quantum oracle of the target cipher has to be implemented. Due to the importance of AES, it is one of the most studied ciphers [3,11,15,17,18] in the context of efficient synthesis of quantum circuits. These implementations can be potentially used in some quantum...
Quantum Attacks on Some Feistel Block Ciphers.Xiaoyang DongBingyou DongXiaoyun WangDong, X., Dong, B., Wang, X.: Quantum attacks on some Feistel block ciphers. IACR Cryptology ePrint Archive 2018, 504 (2018), https://eprint.iacr.org/ 2018/504...
Kaplan, M.: Quantum attacks against iterated block ciphers. CoRR abs/1410.1434 (2014) Google Scholar Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol...
Besides, we find two new applications for this kind of BV-based attack, i.e., related-key attacks on iterated Even鈥揗ansour ciphers and i-round Feistel ciphers with independent round keys.doi:10.1007/s11128-022-03752-xSun Hong-Wei
Besides, we find two new applications for this kind of BV-based attack, i.e., related-key attacks on iterated Even鈥揗ansour ciphers andi-round Feistel ciphers with independent round keys.Hong-Wei Sungrid.31880.320000 0000 8780 1230State Key Laboratory of Networking and Switching Technology...
we continue to study symmetric ciphers against quantum attackers. First, we convert the classical advanced slide attacks (introduced by Biryukov and Wagner) to a quantum one, that gains an exponential speed-up in time complexity. Thus, we could break 2/4K-Feistel and 2/4K-DES in polynomial...