2022
DOI: 10.1007/978-3-031-07082-2_12
|View full text |Cite
|
Sign up to set email alerts
|

Beyond Quadratic Speedups in Quantum Attacks on Symmetric Schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 44 publications
0
3
0
Order By: Relevance
“…Structured attacks with classical queries : It is now known that the structure exploited by some superposition attacks can also be exploited by attacks making only classical queries, that is, by a standard quantum attacker listening to today's classical communications. Though these attacks do not lead to polynomial‐time breaks, they allow one to obtain significantly better time‐memory tradeoffs [80] and a more‐than‐quadratic quantum time speedup on a key‐recovery attack [81]. We will now review the principle of the offline‐Simon algorithm, on which they are based.…”
Section: Symmetric Cryptographymentioning
confidence: 99%
See 2 more Smart Citations
“…Structured attacks with classical queries : It is now known that the structure exploited by some superposition attacks can also be exploited by attacks making only classical queries, that is, by a standard quantum attacker listening to today's classical communications. Though these attacks do not lead to polynomial‐time breaks, they allow one to obtain significantly better time‐memory tradeoffs [80] and a more‐than‐quadratic quantum time speedup on a key‐recovery attack [81]. We will now review the principle of the offline‐Simon algorithm, on which they are based.…”
Section: Symmetric Cryptographymentioning
confidence: 99%
“…In Ref. [81], the offline‐Simon algorithm was extended to target more constructions and in particular, constructions of the form: xEk()k2Ek()k1x, $x{\mapsto}{E}_{k}^{\prime }\left({k}_{2}\oplus {E}_{k}\left({k}_{1}\oplus x\right)\right),$ with two independent block cipher calls keyed by k . Any classical key‐recovery attack requires time Ω(2 5 n /2 ), and the best attack requires also Ω(2 n /2 ) memory.…”
Section: Symmetric Cryptographymentioning
confidence: 99%
See 1 more Smart Citation