Abstract
This paper explores the use of Grover’s Algorithm in the classical rainbow table, uncovering the potential of integrating quantum computing techniques with conventional cryptographic methods to develop a Quantum Rainbow Table. It leverages on quantum concepts and algorithms, including the principles of qubit superposition, entanglement, and teleportation, coupled with Grover’s Algorithm, to enable a more efficient search through the rainbow table. The paper also details the current hardware constraints and a workaround to produce better results in the implementation stages. Through this work, we develop a working prototype of the quantum rainbow table and demonstrate how quantum computing could significantly improve the speed of cyber tools such as password crackers and thus impacting the cybersecurity landscape.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Younes, A.: Strength and weakness in grover’s quantum search algorithm. arXiv preprint arXiv:0811.4481 (2008)
Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 617–630. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45146-4_36
Kumar, H., Kumar, S., Joseph, R., et al.: Rainbow table to crack password using md5 hashing algorithm. In: 2013 IEEE Conference on Information & Communication Technologies, pp. 433–439. IEEE (2013)
Khurana, S., Nene, M.J.: Implementation of database search with quantum computing: Grover’s algorithm vs linear search. In: 2023 International Conference on Ambient Intelligence, Knowledge Informatics and Industrial Electronics (AIKIIE), pp. 1–6. IEEE (2023)
Grassl, M., Langenberg, B., Roetteler, M., Steinwandt, R.: Applying Grover’s algorithm to AES: quantum resource estimates. In: Takagi, T. (ed.) PQCrypto 2016. LNCS, vol. 9606, pp. 29–43. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29360-8_3
Balachandran, V.: Quantum obfuscation: quantum predicates with entangled qubits. In: Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy, pp. 293–295 (2021)
Bennett, C.H., Brassard, G., Ekert, A.K.: Quantum cryptography. Sci. Am. 267(4), 50–57 (1992)
Ko, K.-K., Jung, E.-S.: Development of cybersecurity technology and algorithm based on quantum computing. Appl. Sci. 11(19) (2021). ISSN: 2076-3417. https://doi.org/10.3390/app11199085. https://www.mdpi.com/2076-3417/11/19/9085
Dunkelman, O., Keller, N., Ronen, E., Shamir, A.: Quantum time/memory/data tradeoff attacks. Des. Codes Crypt. 92(1), 159–177 (2024)
Pearson, P.K.: Fast hashing of variable-length text strings. Commun. ACM 33(6), 677–680 (1990)
Frobenius norm - mathematics - sciencedirect. Accessed 24 Mar 2023. https://www.sciencedirect.com/topics/mathematics/frobenius-norm
Mandviwalla, A., Ohshiro, K., Ji, B.: Implementing grovers algorithm on the ibm quantum computers. In. IEEE International Conference on Big Data (Big Data) 2018, pp. 2531–2537 (2018). https://doi.org/10.1109/BigData.2018.8622457
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Quan, L.J., Ye, T.J., Ling, G.G., Balachandran, V. (2025). QIris: Quantum Implementation of Rainbow Table Attacks. In: Patil, V.T., Krishnan, R., Shyamasundar, R.K. (eds) Information Systems Security. ICISS 2024. Lecture Notes in Computer Science, vol 15416. Springer, Cham. https://doi.org/10.1007/978-3-031-80020-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-031-80020-7_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-80019-1
Online ISBN: 978-3-031-80020-7
eBook Packages: Computer ScienceComputer Science (R0)