Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions
This paper shows that quantum computers can significantly speed-up a type of meet-in-the-middle attacks initiated by Demiric and Selçuk (DS-MITM attacks), which is currently one of the most powerful cryptanalytic approaches in the classical setting against symmetric-key schemes. The quantum DS-MITM...
Saved in:
Published in | Security and Cryptography for Networks Vol. 11035; pp. 386 - 403 |
---|---|
Main Authors | , |
Format | Book Chapter |
Language | English |
Published |
Switzerland
Springer International Publishing AG
2018
Springer International Publishing |
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper shows that quantum computers can significantly speed-up a type of meet-in-the-middle attacks initiated by Demiric and Selçuk (DS-MITM attacks), which is currently one of the most powerful cryptanalytic approaches in the classical setting against symmetric-key schemes. The quantum DS-MITM attacks are demonstrated against 6 rounds of the generic Feistel construction supporting an n-bit key and an n-bit block, which was attacked by Guo et al. in the classical setting with data, time, and memory complexities of O(23n/4)$$O(2^{3n/4})$$. The complexities of our quantum attacks depend on the adversary’s model. When the adversary has an access to quantum computers for offline computations but online queries are made in a classical manner, the attack complexities become O~(2n/2)$$\tilde{O}(2^{n/2})$$, which significantly improves the classical attack. The attack is then extended to the case that the adversary can make superposition queries. The attack is based on 3-round distinguishers with Simon’s algorithm and then appends 3 rounds for key recovery. This can be solved by applying the combination of Simon’s and Grover’s algorithms recently proposed by Leander and May. |
---|---|
AbstractList | This paper shows that quantum computers can significantly speed-up a type of meet-in-the-middle attacks initiated by Demiric and Selçuk (DS-MITM attacks), which is currently one of the most powerful cryptanalytic approaches in the classical setting against symmetric-key schemes. The quantum DS-MITM attacks are demonstrated against 6 rounds of the generic Feistel construction supporting an n-bit key and an n-bit block, which was attacked by Guo et al. in the classical setting with data, time, and memory complexities of O(23n/4)$$O(2^{3n/4})$$. The complexities of our quantum attacks depend on the adversary’s model. When the adversary has an access to quantum computers for offline computations but online queries are made in a classical manner, the attack complexities become O~(2n/2)$$\tilde{O}(2^{n/2})$$, which significantly improves the classical attack. The attack is then extended to the case that the adversary can make superposition queries. The attack is based on 3-round distinguishers with Simon’s algorithm and then appends 3 rounds for key recovery. This can be solved by applying the combination of Simon’s and Grover’s algorithms recently proposed by Leander and May. |
Author | Hosoyamada, Akinori Sasaki, Yu |
Author_xml | – sequence: 1 givenname: Akinori orcidid: 0000-0003-2910-2302 surname: Hosoyamada fullname: Hosoyamada, Akinori email: hosoyamada.akinori@lab.ntt.co.jp – sequence: 2 givenname: Yu surname: Sasaki fullname: Sasaki, Yu |
BookMark | eNpVkM1u1DAQx01pq27LvgEHv4DL2JPEMbfVQgtSK8TX2XLi2dbd1Amx80w8CC-Gd8uF00j_L2l-l-w0jpEYeyvhWgLod0a3AgVKI0wrJQqwSr5i6yJjEY8anLCVbKQUiJV5_Z-n8JStAEEJoys8Z5cSajCm0lpfsHVKTwCgoDUttisWvi4u5uWZf6DnMIdefKfhz-9lz--JsghR5EcS98H7gfgmZ9fv03u-maYh9C6HMSaeR96Ib-MSPb-lSGWD31BImQa-LX6el_4YfMPOdm5ItP53r9jPm48_tp_E3Zfbz9vNnXhCMFmQqqiDriuv7Exde9f4SiFVxoGkXvnad1r3NVbOS-yIlG58vTM7UwK-Vg6vmHrZTdMc4gPNthvHfbIS7AGuLaQs2sLKHkHaA9xSql5K0zz-WihlS4dWTzHPbugf3ZRpTrZRhVrTWmW0xdbgX9aGe38 |
ContentType | Book Chapter |
Copyright | Springer Nature Switzerland AG 2018 |
Copyright_xml | – notice: Springer Nature Switzerland AG 2018 |
DBID | FFUUA |
DEWEY | 005.82 |
DOI | 10.1007/978-3-319-98113-0_21 |
DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9783319981130 3319981137 |
EISSN | 1611-3349 |
Editor | Catalano, Dario De Prisco, Roberto |
Editor_xml | – sequence: 1 fullname: Catalano, Dario – sequence: 2 fullname: De Prisco, Roberto |
EndPage | 403 |
ExternalDocumentID | EBC6298368_297_389 |
GroupedDBID | 0D6 0DA 38. AABBV AEDXK AEJLV AEKFX AEZAY ALMA_UNASSIGNED_HOLDINGS ANXHU BBABE BICGV BJAWL BUBNW CVGDX CZZ EDOXC FFUUA FOYMO I4C IEZ NQNQZ OEBZI SBO TPJZQ TSXQS Z7R Z7U Z7X Z7Z Z81 Z83 Z84 Z88 -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE EJD F5P FEDTE HVGLF LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 |
ID | FETCH-LOGICAL-j309t-e24eb0bb998f955da6d423e49a01ec2d5db77c534ad13bee276d5f9f99a0d52a3 |
ISBN | 9783319981123 3319981129 |
ISSN | 0302-9743 |
IngestDate | Tue Jul 29 20:14:46 EDT 2025 Thu May 29 01:12:47 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
LCCallNum | QA268 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-j309t-e24eb0bb998f955da6d423e49a01ec2d5db77c534ad13bee276d5f9f99a0d52a3 |
Notes | Due to space limitations, some details and proofs are left to the full paper [HS17]. Original Abstract: This paper shows that quantum computers can significantly speed-up a type of meet-in-the-middle attacks initiated by Demiric and Selçuk (DS-MITM attacks), which is currently one of the most powerful cryptanalytic approaches in the classical setting against symmetric-key schemes. The quantum DS-MITM attacks are demonstrated against 6 rounds of the generic Feistel construction supporting an n-bit key and an n-bit block, which was attacked by Guo et al. in the classical setting with data, time, and memory complexities of O(23n/4)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $$O(2^{3n/4})$$ \end{document}. The complexities of our quantum attacks depend on the adversary’s model. When the adversary has an access to quantum computers for offline computations but online queries are made in a classical manner, the attack complexities become O~(2n/2)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $$\tilde{O}(2^{n/2})$$ \end{document}, which significantly improves the classical attack. The attack is then extended to the case that the adversary can make superposition queries. The attack is based on 3-round distinguishers with Simon’s algorithm and then appends 3 rounds for key recovery. This can be solved by applying the combination of Simon’s and Grover’s algorithms recently proposed by Leander and May. |
OCLC | 1050994777 |
ORCID | 0000-0003-2910-2302 |
PQID | EBC6298368_297_389 |
PageCount | 18 |
ParticipantIDs | springer_books_10_1007_978_3_319_98113_0_21 proquest_ebookcentralchapters_6298368_297_389 |
PublicationCentury | 2000 |
PublicationDate | 2018 |
PublicationDateYYYYMMDD | 2018-01-01 |
PublicationDate_xml | – year: 2018 text: 2018 |
PublicationDecade | 2010 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland – name: Cham |
PublicationSeriesSubtitle | Security and Cryptology |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationSeriesTitleAlternate | Lect.Notes Computer |
PublicationSubtitle | 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings |
PublicationTitle | Security and Cryptography for Networks |
PublicationYear | 2018 |
Publisher | Springer International Publishing AG Springer International Publishing |
Publisher_xml | – name: Springer International Publishing AG – name: Springer International Publishing |
RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Naor, Moni Mitchell, John C. Terzopoulos, Demetri Steffen, Bernhard Pandu Rangan, C. Kanade, Takeo Kittler, Josef Weikum, Gerhard Hutchison, David Tygar, Doug |
RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni – sequence: 8 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. – sequence: 9 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard – sequence: 10 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri – sequence: 11 givenname: Doug surname: Tygar fullname: Tygar, Doug – sequence: 12 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard |
SSID | ssj0002089838 ssj0002792 |
Score | 2.4296367 |
Snippet | This paper shows that quantum computers can significantly speed-up a type of meet-in-the-middle attacks initiated by Demiric and Selçuk (DS-MITM attacks),... |
SourceID | springer proquest |
SourceType | Publisher |
StartPage | 386 |
SubjectTerms | Claw finding algorithm Demiric-Selçuk meet-in-the-middle attack Feistel construction Grover’s algorithm Post-quantum cryptography Q1 model |
Title | Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions |
URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6298368&ppg=389 http://link.springer.com/10.1007/978-3-319-98113-0_21 |
Volume | 11035 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3LbtNAFB2FsEEseItSQLNgZw1yZvysxKKqWkVVEwloUVmNxp6JZNLYqLYX5TP4CT6EH-POK3HSbsrGSkZWPL7n5M6dO_eB0AdYEVQKSysRVLcwo0VJdHomWVD4V8IeOwqZTk6ezZPpRXR6GV-ORr8HUUt9V3wsf92ZV_I_qMIY4KqzZO-B7PpHYQA-A75wBYThumP8brtZbQ6H6zxn3P9H1zc_O1d92kQOzm1499pinjZtcyNWQlo_6rKqm-tq7V4RrbDtq7_3Qw597kHu_QqU0qoCfUm-qitzsJ72y2CmVEeqmoABSWbGyxEcdp3O2De-xsG5uCkhQb7o_k22ynVVBidK0-vK9Av1FWztXLXgVPvpzJ1tzJvOhIwFvv2E10ZDd8Uk23FXeHfljsNz43Pb2t8yplMAwSRkA7XIQIfDLsgOKau2E12Mkdnip04VM19i23yLTCWF2wvGMEZE53PppzEScl2b4EGaxWP08PD49Ozb2m9Hwyw3J81utdcFGO1JlZ2Vzh_ys85thafNWwxyN-965NYuZ-dg3tg750_RY50Dg3VyCsjvGRqp-jl64iHADoIXqHIMwQOG_P3TL_FtdmDHjgM85AbuGuy4gR03sOMG3uLGS3Rxcnx-NCWueQf5wcK8I4pGqgiLAt58kcexFIkEy11FuQgnqqQylkWaljGLhJywQimaJjJe5IscbpAxFewVGtdNrV4jXKosZSwuS1bICNakQi5UpiKRykyAVLM9RLzYuAkxcHHNpRVSyxMKkCUZp3nKwUDfQ4GXLde3t9zX7gZQOOMACjegcA3Km3vdvY8ebVj_Fo1BTOodmK1d8d4x6R-gRZHH |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Security+and+Cryptography+for+Networks&rft.au=Hosoyamada%2C+Akinori&rft.au=Sasaki%2C+Yu&rft.atitle=Quantum+Demiric-Sel%C3%A7uk+Meet-in-the-Middle+Attacks%3A+Applications+to+6-Round+Generic+Feistel+Constructions&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2018-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319981123&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=386&rft.epage=403&rft_id=info:doi/10.1007%2F978-3-319-98113-0_21 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6298368-l.jpg |