Skip to main content

A First Attempt at Cryptanalyzing a (Toy) Block Cipher by Means of QAOA

  • Conference paper
  • First Online:
Computational Science – ICCS 2022 (ICCS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13353))

Included in the following conference series:

  • 1139 Accesses

Abstract

The discovery of quantum algorithms that may have an impact on cryptography is one of the main reasons of the rise of quantum computing. Currently, all quantum cryptanalysis techniques are purely theoretical and none of them can be executed on existing or near-term quantum devices. So, this paper investigates the capability of already existing quantum computers to attack a toy block cipher (namely the Heys cipher) using the Quantum Approximate Optimization Algorithm (QAOA). Starting from a known-plaintext key recovery problem, we transform it into an instance of the MAX-SAT problem. Then, we propose two ways to implement it in a QAOA circuit and we try to solve it using publicly available IBM Q Experience quantum computers. The results suggest that the limited number of qubits requires the use of exponential algorithms to achieve the transformation of our problem into a MAX-SAT instance and, despite encouraging simulation results, that the corresponding quantum circuit is too deep to work on nowadays (too-)noisy gate-based quantum computers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A sbox (substitution box) is an algorithm component that compute a substitution in a cipher.

References

  1. Ibm q experience. https://quantum-computing.ibm.com

  2. Qiskit source code. https://github.com/QISKit/

  3. Sympy source code. https://github.com/sympy

  4. Bonnetain, X., Hosoyamada, A., Naya-Plasencia, M., Sasaki, Yu., Schrottenloher, A.: Quantum attacks without superposition queries: the offline Simon’s algorithm. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019. LNCS, vol. 11921, pp. 552–583. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34578-5_20

    Chapter  Google Scholar 

  5. Bonnetain, X., Naya-Plasencia, M.: Hidden shift quantum cryptanalysis and implications. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11272, pp. 560–592. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-03326-2_19

    Chapter  Google Scholar 

  6. Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: Quantum security analysis of AES. IACR Trans. Symm. Cryptol. 2019(2), 55–93 (2019)

    Article  Google Scholar 

  7. Farhi, E., Goldstone, J., Gutmann, S.: A quantum approximate optimization algorithm. arXiv preprint arXiv:1411.4028 (2014)

  8. Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 212–219 (1996)

    Google Scholar 

  9. Heys, H.M.: A tutorial on linear and differential cryptanalysis. Cryptologia 26(3), 189–221 (2002)

    Article  Google Scholar 

  10. Jukna, S., et al.: Boolean Function Complexity: Advances and Frontiers, vol. 5. Springer, Heidelberg (2012)

    Google Scholar 

  11. Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Quantum differential and linear cryptanalysis. arXiv preprint arXiv:1510.05836 (2015)

  12. Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: 2010 IEEE International Symposium on Information Theory, pp. 2682–2685. IEEE (2010)

    Google Scholar 

  13. Kuwakado, H., Morii, M.: Security on the quantum-type even-Mansour cipher. In: 2012 International Symposium on Information Theory and its Applications, pp. 312–316. IEEE (2012)

    Google Scholar 

  14. Massacci, F., Marraro, L.: Logical cryptanalysis as a sat problem. J. Autom. Reason. 24(1), 165–203 (2000)

    Article  MathSciNet  Google Scholar 

  15. Powell, M.J.: A direct search optimization method that models the objective and constraint functions by linear interpolation. In: Gomez, S., Hennart, J.P. (eds.) Advances in Optimization and Numerical Analysis. Mathematics and Its Applications, vol. 275, pp. 51–67 (1994). Springer, Dordrecht. https://doi.org/10.1007/978-94-015-8330-5_4

  16. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. IEEE (1994)

    Google Scholar 

  17. Sun, Y., Zhang, J.Y., Byrd, M.S., Wu, L.A.: Adiabatic quantum simulation using trotterization. arXiv preprint arXiv:1805.11568 (2018)

  18. Tseitin, G.S.: On the complexity of derivation in propositional calculus. In: Siekmann, J.H., Wrightson, G. (eds.) Automation of Reasoning. Symbolic Computation, pp. 466–483. Springer, Heidelberg (1983). https://doi.org/10.1007/978-3-642-81955-1_28

  19. Welchman, G.: The Hut Six Story: Breaking the Enigma Codes. M. & M, Baldwin (1997)

    Google Scholar 

  20. Zhou, L., Wang, S.T., Choi, S., Pichler, H., Lukin, M.D.: Quantum approximate optimization algorithm: Performance, mechanism, and implementation on near-term devices. Phys. Rev. X 10(2), 021067 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stéphane Louise .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Phab, L., Louise, S., Sirdey, R. (2022). A First Attempt at Cryptanalyzing a (Toy) Block Cipher by Means of QAOA. In: Groen, D., de Mulatier, C., Paszynski, M., Krzhizhanovskaya, V.V., Dongarra, J.J., Sloot, P.M.A. (eds) Computational Science – ICCS 2022. ICCS 2022. Lecture Notes in Computer Science, vol 13353. Springer, Cham. https://doi.org/10.1007/978-3-031-08760-8_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-08760-8_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-08759-2

  • Online ISBN: 978-3-031-08760-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics