Using Bernstein-Vazirani Algorithm to Attack Block Ciphers

11/02/2017
by   Huiqin Xie, et al.
0

In this paper, we study applications of Bernstein-Vazirani algorithm and present several new methods to attack block ciphers. Specifically, we first present a quantum algorithm for finding the linear structures of a function. Based on it, we propose new quantum distinguishers for the 3-round Feistel scheme and a new quantum algorithm to recover partial key of the Even-Mansour construction. Afterwards, by observing that the linear structures of a encryption function are actually high probability differentials of it, we apply our algorithm to differential analysis and impossible differential cryptanalysis respectively. We also propose a new kind of differential cryptanalysis, called quantum small probability differential cryptanalysis, based on the fact that the linear structures found by our algorithm are also the linear structure of each component function. To our knowledge, no similar method was proposed before. The efficiency and success probability of all attacks are analyzed rigorously. Since our algorithm treats the encryption function as a whole, it avoid the disadvantage of traditional differential cryptanalysis that it is difficult to extending the differential path.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/18/2017

Quantum impossible differential and truncated differential cryptanalysis

We study applications of BV algorithm and present quantum versions of im...
research
12/09/2021

Deep Learning based Differential Distinguisher for Lightweight Block Ciphers

Recent years have seen an increasing involvement of Deep Learning in the...
research
03/22/2022

Quantum Cryptanalysis of Farfalle and (Generalised) Feistel Network

Farfalle is a permutation-based pseudo-random function which has been pr...
research
12/14/2021

INRU: A Quasigroup Based Lightweight Block Cipher

In this paper, we propose a quasigroup based block cipher design. The ro...
research
08/26/2019

Squeezing a vectorial nonlinear binary transformation between two perpendicular matrices

We propose a new primitive that could serve as a component in the design...
research
08/07/2020

Scytale – An Evolutionary Cryptosystem

With the advent of quantum computing, and other advancements in computat...

Please sign up or login with your details

Forgot password? Click here to reset