Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions

This paper shows that quantum computers can significantly speed-up a type of meet-in-the-middle attacks initiated by Demiric and Selçuk (DS-MITM attacks), which is currently one of the most powerful cryptanalytic approaches in the classical setting against symmetric-key schemes. The quantum DS-MITM...

Full description

Saved in:
Bibliographic Details
Published inSecurity and Cryptography for Networks Vol. 11035; pp. 386 - 403
Main Authors Hosoyamada, Akinori, Sasaki, Yu
Format Book Chapter
LanguageEnglish
Published Switzerland Springer International Publishing AG 2018
Springer International Publishing
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This paper shows that quantum computers can significantly speed-up a type of meet-in-the-middle attacks initiated by Demiric and Selçuk (DS-MITM attacks), which is currently one of the most powerful cryptanalytic approaches in the classical setting against symmetric-key schemes. The quantum DS-MITM attacks are demonstrated against 6 rounds of the generic Feistel construction supporting an n-bit key and an n-bit block, which was attacked by Guo et al. in the classical setting with data, time, and memory complexities of O(23n/4)$$O(2^{3n/4})$$. The complexities of our quantum attacks depend on the adversary’s model. When the adversary has an access to quantum computers for offline computations but online queries are made in a classical manner, the attack complexities become O~(2n/2)$$\tilde{O}(2^{n/2})$$, which significantly improves the classical attack. The attack is then extended to the case that the adversary can make superposition queries. The attack is based on 3-round distinguishers with Simon’s algorithm and then appends 3 rounds for key recovery. This can be solved by applying the combination of Simon’s and Grover’s algorithms recently proposed by Leander and May.
AbstractList This paper shows that quantum computers can significantly speed-up a type of meet-in-the-middle attacks initiated by Demiric and Selçuk (DS-MITM attacks), which is currently one of the most powerful cryptanalytic approaches in the classical setting against symmetric-key schemes. The quantum DS-MITM attacks are demonstrated against 6 rounds of the generic Feistel construction supporting an n-bit key and an n-bit block, which was attacked by Guo et al. in the classical setting with data, time, and memory complexities of O(23n/4)$$O(2^{3n/4})$$. The complexities of our quantum attacks depend on the adversary’s model. When the adversary has an access to quantum computers for offline computations but online queries are made in a classical manner, the attack complexities become O~(2n/2)$$\tilde{O}(2^{n/2})$$, which significantly improves the classical attack. The attack is then extended to the case that the adversary can make superposition queries. The attack is based on 3-round distinguishers with Simon’s algorithm and then appends 3 rounds for key recovery. This can be solved by applying the combination of Simon’s and Grover’s algorithms recently proposed by Leander and May.
Author Hosoyamada, Akinori
Sasaki, Yu
Author_xml – sequence: 1
  givenname: Akinori
  orcidid: 0000-0003-2910-2302
  surname: Hosoyamada
  fullname: Hosoyamada, Akinori
  email: hosoyamada.akinori@lab.ntt.co.jp
– sequence: 2
  givenname: Yu
  surname: Sasaki
  fullname: Sasaki, Yu
BookMark eNpVkM1u1DAQx01pq27LvgEHv4DL2JPEMbfVQgtSK8TX2XLi2dbd1Amx80w8CC-Gd8uF00j_L2l-l-w0jpEYeyvhWgLod0a3AgVKI0wrJQqwSr5i6yJjEY8anLCVbKQUiJV5_Z-n8JStAEEJoys8Z5cSajCm0lpfsHVKTwCgoDUttisWvi4u5uWZf6DnMIdefKfhz-9lz--JsghR5EcS98H7gfgmZ9fv03u-maYh9C6HMSaeR96Ib-MSPb-lSGWD31BImQa-LX6el_4YfMPOdm5ItP53r9jPm48_tp_E3Zfbz9vNnXhCMFmQqqiDriuv7Exde9f4SiFVxoGkXvnad1r3NVbOS-yIlG58vTM7UwK-Vg6vmHrZTdMc4gPNthvHfbIS7AGuLaQs2sLKHkHaA9xSql5K0zz-WihlS4dWTzHPbugf3ZRpTrZRhVrTWmW0xdbgX9aGe38
ContentType Book Chapter
Copyright Springer Nature Switzerland AG 2018
Copyright_xml – notice: Springer Nature Switzerland AG 2018
DBID FFUUA
DEWEY 005.82
DOI 10.1007/978-3-319-98113-0_21
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783319981130
3319981137
EISSN 1611-3349
Editor Catalano, Dario
De Prisco, Roberto
Editor_xml – sequence: 1
  fullname: Catalano, Dario
– sequence: 2
  fullname: De Prisco, Roberto
EndPage 403
ExternalDocumentID EBC6298368_297_389
GroupedDBID 0D6
0DA
38.
AABBV
AEDXK
AEJLV
AEKFX
AEZAY
ALMA_UNASSIGNED_HOLDINGS
ANXHU
BBABE
BICGV
BJAWL
BUBNW
CVGDX
CZZ
EDOXC
FFUUA
FOYMO
I4C
IEZ
NQNQZ
OEBZI
SBO
TPJZQ
TSXQS
Z7R
Z7U
Z7X
Z7Z
Z81
Z83
Z84
Z88
-DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-j309t-e24eb0bb998f955da6d423e49a01ec2d5db77c534ad13bee276d5f9f99a0d52a3
ISBN 9783319981123
3319981129
ISSN 0302-9743
IngestDate Tue Jul 29 20:14:46 EDT 2025
Thu May 29 01:12:47 EDT 2025
IsPeerReviewed true
IsScholarly true
LCCallNum QA268
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-j309t-e24eb0bb998f955da6d423e49a01ec2d5db77c534ad13bee276d5f9f99a0d52a3
Notes Due to space limitations, some details and proofs are left to the full paper [HS17].
Original Abstract: This paper shows that quantum computers can significantly speed-up a type of meet-in-the-middle attacks initiated by Demiric and Selçuk (DS-MITM attacks), which is currently one of the most powerful cryptanalytic approaches in the classical setting against symmetric-key schemes. The quantum DS-MITM attacks are demonstrated against 6 rounds of the generic Feistel construction supporting an n-bit key and an n-bit block, which was attacked by Guo et al. in the classical setting with data, time, and memory complexities of O(23n/4)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $$O(2^{3n/4})$$ \end{document}. The complexities of our quantum attacks depend on the adversary’s model. When the adversary has an access to quantum computers for offline computations but online queries are made in a classical manner, the attack complexities become O~(2n/2)\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document} $$\tilde{O}(2^{n/2})$$ \end{document}, which significantly improves the classical attack. The attack is then extended to the case that the adversary can make superposition queries. The attack is based on 3-round distinguishers with Simon’s algorithm and then appends 3 rounds for key recovery. This can be solved by applying the combination of Simon’s and Grover’s algorithms recently proposed by Leander and May.
OCLC 1050994777
ORCID 0000-0003-2910-2302
PQID EBC6298368_297_389
PageCount 18
ParticipantIDs springer_books_10_1007_978_3_319_98113_0_21
proquest_ebookcentralchapters_6298368_297_389
PublicationCentury 2000
PublicationDate 2018
PublicationDateYYYYMMDD 2018-01-01
PublicationDate_xml – year: 2018
  text: 2018
PublicationDecade 2010
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Cham
PublicationSeriesSubtitle Security and Cryptology
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationSubtitle 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings
PublicationTitle Security and Cryptography for Networks
PublicationYear 2018
Publisher Springer International Publishing AG
Springer International Publishing
Publisher_xml – name: Springer International Publishing AG
– name: Springer International Publishing
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Steffen, Bernhard
Pandu Rangan, C.
Kanade, Takeo
Kittler, Josef
Weikum, Gerhard
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
– sequence: 8
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
– sequence: 9
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
– sequence: 10
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
– sequence: 11
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
– sequence: 12
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
SSID ssj0002089838
ssj0002792
Score 2.4296367
Snippet This paper shows that quantum computers can significantly speed-up a type of meet-in-the-middle attacks initiated by Demiric and Selçuk (DS-MITM attacks),...
SourceID springer
proquest
SourceType Publisher
StartPage 386
SubjectTerms Claw finding algorithm
Demiric-Selçuk meet-in-the-middle attack
Feistel construction
Grover’s algorithm
Post-quantum cryptography
Q1 model
Title Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6298368&ppg=389
http://link.springer.com/10.1007/978-3-319-98113-0_21
Volume 11035
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3LbtNAFB2FsEEseItSQLNgZw1yZvysxKKqWkVVEwloUVmNxp6JZNLYqLYX5TP4CT6EH-POK3HSbsrGSkZWPL7n5M6dO_eB0AdYEVQKSysRVLcwo0VJdHomWVD4V8IeOwqZTk6ezZPpRXR6GV-ORr8HUUt9V3wsf92ZV_I_qMIY4KqzZO-B7PpHYQA-A75wBYThumP8brtZbQ6H6zxn3P9H1zc_O1d92kQOzm1499pinjZtcyNWQlo_6rKqm-tq7V4RrbDtq7_3Qw597kHu_QqU0qoCfUm-qitzsJ72y2CmVEeqmoABSWbGyxEcdp3O2De-xsG5uCkhQb7o_k22ynVVBidK0-vK9Av1FWztXLXgVPvpzJ1tzJvOhIwFvv2E10ZDd8Uk23FXeHfljsNz43Pb2t8yplMAwSRkA7XIQIfDLsgOKau2E12Mkdnip04VM19i23yLTCWF2wvGMEZE53PppzEScl2b4EGaxWP08PD49Ozb2m9Hwyw3J81utdcFGO1JlZ2Vzh_ys85thafNWwxyN-965NYuZ-dg3tg750_RY50Dg3VyCsjvGRqp-jl64iHADoIXqHIMwQOG_P3TL_FtdmDHjgM85AbuGuy4gR03sOMG3uLGS3Rxcnx-NCWueQf5wcK8I4pGqgiLAt58kcexFIkEy11FuQgnqqQylkWaljGLhJywQimaJjJe5IscbpAxFewVGtdNrV4jXKosZSwuS1bICNakQi5UpiKRykyAVLM9RLzYuAkxcHHNpRVSyxMKkCUZp3nKwUDfQ4GXLde3t9zX7gZQOOMACjegcA3Km3vdvY8ebVj_Fo1BTOodmK1d8d4x6R-gRZHH
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Security+and+Cryptography+for+Networks&rft.au=Hosoyamada%2C+Akinori&rft.au=Sasaki%2C+Yu&rft.atitle=Quantum+Demiric-Sel%C3%A7uk+Meet-in-the-Middle+Attacks%3A+Applications+to+6-Round+Generic+Feistel+Constructions&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2018-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319981123&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=386&rft.epage=403&rft_id=info:doi/10.1007%2F978-3-319-98113-0_21
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6298368-l.jpg