2022
DOI: 10.1007/s11128-022-03752-x
|View full text |Cite
|
Sign up to set email alerts
|

Improved BV-based quantum attack on block ciphers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…In [35], Xie and Yang proposed quantum related-key attacks on iterated Even-Mansour cipher using the Bernstein-Vazirani (BV) algorithm [36]. Subsequently, Sun et al [37] improved a BV-based quantum attack, applying it to related-key attacks on iterated Even-Mansour and Feistel ciphers with independent round keys. In addition to, in INDOCRYPT 2020, Cid et al [30] showed quantum distinguishing and key-recovery attacks on contracting Feistel-KF structures with Simon's algorithm can be extended to related-key attacks in quantum superposition.…”
Section: Introductionmentioning
confidence: 99%
“…In [35], Xie and Yang proposed quantum related-key attacks on iterated Even-Mansour cipher using the Bernstein-Vazirani (BV) algorithm [36]. Subsequently, Sun et al [37] improved a BV-based quantum attack, applying it to related-key attacks on iterated Even-Mansour and Feistel ciphers with independent round keys. In addition to, in INDOCRYPT 2020, Cid et al [30] showed quantum distinguishing and key-recovery attacks on contracting Feistel-KF structures with Simon's algorithm can be extended to related-key attacks in quantum superposition.…”
Section: Introductionmentioning
confidence: 99%
“…Later, Malviya et al concluded several latest quantum cryptanalysis techniques including qRKA for attacking symmetric cryptography [21]. In 2023, Sun et al introduced an improved BV-based algorithm to realize a quadratic speedup and presented qRKAs on iterated Even-Mansour ciphers and i-round Feistel ciphers with independent round keys [35].…”
Section: Introductionmentioning
confidence: 99%
“…This started with the 3-round Feistel distinguisher proposed by Kuwakado and Morii. [16] After that, more generic constructions, such as Even-Mansour cipher, [17,18] FX construction, [19] message authentication codes (MACs), [20][21][22][23] etc, [24][25][26] were broken by different quantum algorithms, including Simon algorithm, [27] Grover algorithm, [28] Grover-meets-Simon algorithm, [19] Bernstein-Vazirani (BV) algorithm, [29] etc.…”
Section: Introduction 1quantum Attacks Against Symmetric Crypto Primi...mentioning
confidence: 99%