Abstract
The development of quantum computers has urged the cryptographic community to prepare cryptographic primitives for the eventual arrival of the post-quantum world. At Asiacrypt 2017, Leander and May combined Grover’s and Simon’s quantum algorithms to break the FX-based block ciphers. Technically this result is based on the combination of the quantum algorithms of Grover’s and Simon’s for the first time in the cryptographic setting. In this study, we using Bernstein–Vazirani’s and Grover’s algorithms to generate a new quantum key-recovery attacks on different rounds of Feistel constructions. An advantage of our attack is the keys can be divided into multiple blocks to enter the S-box and realize the process of recovery; this method greatly reduces the complexity of key recovery. Hence, it has strong practicability for key recovery (e.g., DES, Camellia, etc.). In order to show that, a detailed process has been provided in this paper.


Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26, 1484–1509 (1997)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)
Grover, L.K.: Quantum computers can search arbitrarily large databases by a single query. Phys Rev Lett 79(23), 4709 (1997)
Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. In: IEEE international symposium on information theory, IEEE (2010)
Simon, Daniel R.: On the power of quantum computation. SIAM J. Comput. 26(5), 1474–1483 (1997)
Even, S., Mansour, Y.: A construction of a cipher from a single pseudorandom permutation. J. Cryptol. 10(3), 151–161 (1997)
Kuwakado, H., Morii, M.: In: Security on the quantum-type even-mansour cipher. Honolulu , pp. 312–316 (2012)
Kaplan, M., Leurent, G., Leverrier, A., et al.: Breaking symmetric cryptosystems using quantum period finding. In: Advances in Cryptology: CRYPTO 2016. Springer-Verlag, Berlin, pp. 207–237 (2016)
Kaplan, M.: Quantum attacks against iterated block ciphers. Mat. Vopr. Kriptogr. 7(2), 71–90 (2016)
Kaplan, M., Leurent, G., Leverrier, A., et al.: Quantum differential and linear cryptanalysis. Comput. Sci., pp. 71–94 (2017)
Dong, X., Wang, X.: Quantum key-recovery attack on Feistel structures. Sci. China (Inf. Sci.) 61(102501), 1–7 (2018)
Hosoyamada, A., Yu, S.: Quantum Demiric-Seluk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions. Security and Cryptography for Networks, pp. 386–403 (2018)
Bernstein, E., Vazirani, U., et al.: Quantum complexity theory. SIAM J. Comput. 26(5), 1411–1473 (1997)
Li, H.W., Yang, L.: Quantum differential cryptanalysis to the block ciphers. In: International conference on applications and techniques in information security, pp. 44–51 (2015)
Sylvie, Dubuc: Characterization of linear structures. Des. Codes Cryptogr. 22(1), 33–45 (2001)
Li, H.W., Yang, L.: A quantum algorithm to approximate the linear structures of Boolean functions. Math. Struct. Comput. Sci. 28, 1–13 (2018)
Xie, H., Yang, L.: Using Bernstein-Vazirani algorithm to attack block ciphers. Des. Codes Cryptogr. 87(5), 1161–1182 (2019)
Xie, H., Yang, L.: A quantum related-key attack based on Bernstein-Vazirani algorithm (2018). arXiv:1808.03266 [quantph]
Nyberg, K.: Constructions of bent functions and difference sets. In: EUROCRYPT, pp. 151–160 (1990)
Brassard, G., Hoyer, P., Mosca, M., et al.: Quantum amplitude amplification and estimation. AMS Contemp. Math. 305, 53–74 (2002)
Dinur, I., Dunkelman, O., Keller, N., et al.: New attacks on Feistel structures with improved memory complexities. In: Advances in Cryptology: CRYPTO 2015, Part I. Springer, Berlin, pp. 433–454 (2015)
Leander, G., May, A.: Grover meets simon—quantumly attacking the FX-construction. In: Advances in Cryptology: ASIACRYPT 2017, Part II. Springer, Berlin, pp. 161–178 (2017)
Lub, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373–386 (1998)
Acknowledgements
This work is supported by the 13th Five-Year National Cryptographic Fund, No. MMJJ20180217.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhou, BM., Yuan, Z. Quantum key-recovery attack on Feistel constructions: Bernstein–Vazirani meet Grover algorithm. Quantum Inf Process 20, 330 (2021). https://doi.org/10.1007/s11128-021-03256-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-021-03256-0