2017
DOI: 10.1007/978-3-319-69453-5_18
|View full text |Cite
|
Sign up to set email alerts
|

Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3

Abstract: Abstract. We investigate the cost of Grover's quantum search algorithm when used in the context of pre-image attacks on the SHA-2 and SHA-3 families of hash functions. Our cost model assumes that the attack is run on a surface code based fault-tolerant quantum computer. Our estimates rely on a time-area metric that costs the number of logical qubits times the depth of the circuit in units of surface code cycles. As a surface code cycle involves a significant classical processing stage, our cost estimates allow… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
69
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 74 publications
(70 citation statements)
references
References 27 publications
0
69
0
1
Order By: Relevance
“…Here we outline our resource methdology, which follows a model developed by several previous works in this area [3,8,10,53,78]. The model assumes that the quantum computation is encoded using the surface code [53], a quantum error-correcting code with properties that make it an excellent candidate for implementation on near-term hardware platforms (e.g.…”
Section: Timing and Cost Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Here we outline our resource methdology, which follows a model developed by several previous works in this area [3,8,10,53,78]. The model assumes that the quantum computation is encoded using the surface code [53], a quantum error-correcting code with properties that make it an excellent candidate for implementation on near-term hardware platforms (e.g.…”
Section: Timing and Cost Modelmentioning
confidence: 99%
“…The second variant can be obtained from the first by rejecting any colouring which uses more than k colours. In order to determine a challenging value of k for a given graph G, we first run the first variant of DSATUR to calculate the 8 Where "easier" should be interpreted from a practical point of view; from the perspective of computational complexity theory, the two problems are polynomial-time equivalent. chromatic number χ(G), then the second variant with k = χ(G).…”
Section: Graph Colouringmentioning
confidence: 99%
See 1 more Smart Citation
“…SHA-2 and SHA-3 Pre-Image Search. Amy et al reported the quantum costs of SHA-2 and SHA-3 pre-image search in the units of logical and physical qubit and gate [4]. The method considers an error-correction scheme called surface code.…”
Section: Quantum Resource Estimatesmentioning
confidence: 99%
“…The SHA3 hash function, Keccak, is chosen as the random oracle in the proposed Ring-TESLA designs, due to its speed in hardware as well as its post-quantum security [18]. A LHW polynomial multiplication module is also designed to compute on the LHW output of the hash function.…”
Section: A Hardware Componentsmentioning
confidence: 99%