Quantum Cryptanalysis of Farfalle and (Generalised) Feistel Network

03/22/2022
by   S. Hodžić, et al.
0

Farfalle is a permutation-based pseudo-random function which has been proposed by G. Bertoni et al. in 2017. In this work, we show that by observing suitable inputs to Farfalle, one can derive various constructions of a periodic function with a period that involves a secret key. As this admits the application of Simon's algorithm in the so-called Q2 attack model, we further show that in the case when internal rolling function is linear, then the secret key can be extracted under feasible assumptions. Furthermore, using the provided constructions of periodic functions for Farfalle, we show that one can mount forgery attacks on the session-supporting mode for authenticated encryption (Farfalle-SAE) and the synthetic initial value AE mode (Farfalle-SIV). In addition, as the wide block cipher mode Farfalle-WBC is a 4-round Feistel scheme, a quantum distinguisher is constructed in the case when input branches are containing at last two blocks, where length of one block corresponds to the size of a permutation employed in Farfalle (a similar attack can be mounted to Farfalle-WBC-AE). And finally, we consider the problem of extracting a secret round key out of different periods obtained from a (Generalized) Feistel scheme (GFN), which has not been addressed in any of the previous works which consider the application of Simon's (or Simon-Grover) algorithm to round reduced versions of GFNs. In this part, we assume that the key is added to an input of an inner function utilized in the round function of a given GFN. By applying two different interpolation formulas, we show that one can extract the round key by utilizing amount of different periods which is closely related to the polynomial/algebraic degree of underlying inner function.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/03/2020

On the primitivity of Lai-Massey schemes

In symmetric cryptography, the round functions used as building blocks f...
research
11/02/2017

Using Bernstein-Vazirani Algorithm to Attack Block Ciphers

In this paper, we study applications of Bernstein-Vazirani algorithm and...
research
05/09/2022

On recovering block cipher secret keys in the cold boot attack setting

This paper presents a general strategy to recover a block cipher secret ...
research
02/21/2018

A Novel Image Encryption Scheme Based on Different Block Sizes for Grayscale and Color Images

In this paper, two image encryption schemes are proposed for grayscale a...
research
08/09/2018

A quantum related-key attack based on Bernstein-Vazirani algorithm

Due to the powerful computing capability of quantum computers, cryptogra...
research
01/27/2023

Improved Differential-neural Cryptanalysis for Round-reduced Simeck32/64

In CRYPTO 2019, Gohr presented differential-neural cryptanalysis by buil...
research
02/08/2020

Invariant Hopping Attacks on Block Ciphers

Block ciphers are in widespread use since the 1970s. Their iterated stru...

Please sign up or login with your details

Forgot password? Click here to reset