Abstract
The discovery of quantum algorithms that may have an impact on cryptography is one of the main reasons of the rise of quantum computing. Currently, all quantum cryptanalysis techniques are purely theoretical and none of them can be executed on existing or near-term quantum devices. So, this paper investigates the capability of already existing quantum computers to attack a toy block cipher (namely the Heys cipher) using the Quantum Approximate Optimization Algorithm (QAOA). Starting from a known-plaintext key recovery problem, we transform it into an instance of the MAX-SAT problem. Then, we propose two ways to implement it in a QAOA circuit and we try to solve it using publicly available IBM Q Experience quantum computers. The results suggest that the limited number of qubits requires the use of exponential algorithms to achieve the transformation of our problem into a MAX-SAT instance and, despite encouraging simulation results, that the corresponding quantum circuit is too deep to work on nowadays (too-)noisy gate-based quantum computers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
A sbox (substitution box) is an algorithm component that compute a substitution in a cipher.
References
Ibm q experience. https://quantum-computing.ibm.com
Qiskit source code. https://github.com/QISKit/
Sympy source code. https://github.com/sympy
Bonnetain, X., Hosoyamada, A., Naya-Plasencia, M., Sasaki, Yu., Schrottenloher, A.: Quantum attacks without superposition queries: the offline Simon’s algorithm. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019. LNCS, vol. 11921, pp. 552–583. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34578-5_20
Bonnetain, X., Naya-Plasencia, M.: Hidden shift quantum cryptanalysis and implications. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11272, pp. 560–592. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-03326-2_19
Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: Quantum security analysis of AES. IACR Trans. Symm. Cryptol. 2019(2), 55–93 (2019)
Farhi, E., Goldstone, J., Gutmann, S.: A quantum approximate optimization algorithm. arXiv preprint arXiv:1411.4028 (2014)
Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 212–219 (1996)
Heys, H.M.: A tutorial on linear and differential cryptanalysis. Cryptologia 26(3), 189–221 (2002)
Jukna, S., et al.: Boolean Function Complexity: Advances and Frontiers, vol. 5. Springer, Heidelberg (2012)
Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Quantum differential and linear cryptanalysis. arXiv preprint arXiv:1510.05836 (2015)
Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: 2010 IEEE International Symposium on Information Theory, pp. 2682–2685. IEEE (2010)
Kuwakado, H., Morii, M.: Security on the quantum-type even-Mansour cipher. In: 2012 International Symposium on Information Theory and its Applications, pp. 312–316. IEEE (2012)
Massacci, F., Marraro, L.: Logical cryptanalysis as a sat problem. J. Autom. Reason. 24(1), 165–203 (2000)
Powell, M.J.: A direct search optimization method that models the objective and constraint functions by linear interpolation. In: Gomez, S., Hennart, J.P. (eds.) Advances in Optimization and Numerical Analysis. Mathematics and Its Applications, vol. 275, pp. 51–67 (1994). Springer, Dordrecht. https://doi.org/10.1007/978-94-015-8330-5_4
Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. IEEE (1994)
Sun, Y., Zhang, J.Y., Byrd, M.S., Wu, L.A.: Adiabatic quantum simulation using trotterization. arXiv preprint arXiv:1805.11568 (2018)
Tseitin, G.S.: On the complexity of derivation in propositional calculus. In: Siekmann, J.H., Wrightson, G. (eds.) Automation of Reasoning. Symbolic Computation, pp. 466–483. Springer, Heidelberg (1983). https://doi.org/10.1007/978-3-642-81955-1_28
Welchman, G.: The Hut Six Story: Breaking the Enigma Codes. M. & M, Baldwin (1997)
Zhou, L., Wang, S.T., Choi, S., Pichler, H., Lukin, M.D.: Quantum approximate optimization algorithm: Performance, mechanism, and implementation on near-term devices. Phys. Rev. X 10(2), 021067 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Phab, L., Louise, S., Sirdey, R. (2022). A First Attempt at Cryptanalyzing a (Toy) Block Cipher by Means of QAOA. In: Groen, D., de Mulatier, C., Paszynski, M., Krzhizhanovskaya, V.V., Dongarra, J.J., Sloot, P.M.A. (eds) Computational Science – ICCS 2022. ICCS 2022. Lecture Notes in Computer Science, vol 13353. Springer, Cham. https://doi.org/10.1007/978-3-031-08760-8_19
Download citation
DOI: https://doi.org/10.1007/978-3-031-08760-8_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-08759-2
Online ISBN: 978-3-031-08760-8
eBook Packages: Computer ScienceComputer Science (R0)