Skip to main content

QIris: Quantum Implementation of Rainbow Table Attacks

  • Conference paper
  • First Online:
Information Systems Security (ICISS 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 15416))

Included in the following conference series:

  • 268 Accesses

Abstract

This paper explores the use of Grover’s Algorithm in the classical rainbow table, uncovering the potential of integrating quantum computing techniques with conventional cryptographic methods to develop a Quantum Rainbow Table. It leverages on quantum concepts and algorithms, including the principles of qubit superposition, entanglement, and teleportation, coupled with Grover’s Algorithm, to enable a more efficient search through the rainbow table. The paper also details the current hardware constraints and a workaround to produce better results in the implementation stages. Through this work, we develop a working prototype of the quantum rainbow table and demonstrate how quantum computing could significantly improve the speed of cyber tools such as password crackers and thus impacting the cybersecurity landscape.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Younes, A.: Strength and weakness in grover’s quantum search algorithm. arXiv preprint arXiv:0811.4481 (2008)

  2. Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 617–630. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45146-4_36

    Chapter  Google Scholar 

  3. Kumar, H., Kumar, S., Joseph, R., et al.: Rainbow table to crack password using md5 hashing algorithm. In: 2013 IEEE Conference on Information & Communication Technologies, pp. 433–439. IEEE (2013)

    Google Scholar 

  4. Khurana, S., Nene, M.J.: Implementation of database search with quantum computing: Grover’s algorithm vs linear search. In: 2023 International Conference on Ambient Intelligence, Knowledge Informatics and Industrial Electronics (AIKIIE), pp. 1–6. IEEE (2023)

    Google Scholar 

  5. Grassl, M., Langenberg, B., Roetteler, M., Steinwandt, R.: Applying Grover’s algorithm to AES: quantum resource estimates. In: Takagi, T. (ed.) PQCrypto 2016. LNCS, vol. 9606, pp. 29–43. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29360-8_3

    Chapter  Google Scholar 

  6. Balachandran, V.: Quantum obfuscation: quantum predicates with entangled qubits. In: Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy, pp. 293–295 (2021)

    Google Scholar 

  7. Bennett, C.H., Brassard, G., Ekert, A.K.: Quantum cryptography. Sci. Am. 267(4), 50–57 (1992)

    Article  Google Scholar 

  8. Ko, K.-K., Jung, E.-S.: Development of cybersecurity technology and algorithm based on quantum computing. Appl. Sci. 11(19) (2021). ISSN: 2076-3417. https://doi.org/10.3390/app11199085. https://www.mdpi.com/2076-3417/11/19/9085

  9. Dunkelman, O., Keller, N., Ronen, E., Shamir, A.: Quantum time/memory/data tradeoff attacks. Des. Codes Crypt. 92(1), 159–177 (2024)

    Article  MathSciNet  Google Scholar 

  10. Pearson, P.K.: Fast hashing of variable-length text strings. Commun. ACM 33(6), 677–680 (1990)

    Article  Google Scholar 

  11. Frobenius norm - mathematics - sciencedirect. Accessed 24 Mar 2023. https://www.sciencedirect.com/topics/mathematics/frobenius-norm

  12. Mandviwalla, A., Ohshiro, K., Ji, B.: Implementing grovers algorithm on the ibm quantum computers. In. IEEE International Conference on Big Data (Big Data) 2018, pp. 2531–2537 (2018). https://doi.org/10.1109/BigData.2018.8622457

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vivek Balachandran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Quan, L.J., Ye, T.J., Ling, G.G., Balachandran, V. (2025). QIris: Quantum Implementation of Rainbow Table Attacks. In: Patil, V.T., Krishnan, R., Shyamasundar, R.K. (eds) Information Systems Security. ICISS 2024. Lecture Notes in Computer Science, vol 15416. Springer, Cham. https://doi.org/10.1007/978-3-031-80020-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-80020-7_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-80019-1

  • Online ISBN: 978-3-031-80020-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics