Quantum Query Lower Bounds for Key Recovery Attacks on the Even-Mansour Cipher

08/21/2023
by   Akinori Kawachi, et al.
0

The Even-Mansour (EM) cipher is one of the famous constructions for a block cipher. Kuwakado and Morii demonstrated that a quantum adversary can recover its n-bit secret keys only with O(n) nonadaptive quantum queries. While the security of the EM cipher and its variants is well-understood for classical adversaries, very little is currently known of their quantum security. Towards a better understanding of the quantum security, or the limits of quantum adversaries for the EM cipher, we study the quantum query complexity for the key recovery of the EM cipher and prove every quantum algorithm requires Ω(n) quantum queries for the key recovery even if it is allowed to make adaptive queries. Therefore, the quantum attack of Kuwakado and Morii has the optimal query complexity up to a constant factor, and we cannot asymptotically improve it even with adaptive quantum queries.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/06/2021

Beyond quadratic speedups in quantum attacks on symmetric schemes

In this paper, we report the first quantum key-recovery attack on a symm...
research
10/17/2018

Understanding the Related-Key Security of Feistel Ciphers from a Provable Perspective

We initiate the provable related-key security treatment for models of pr...
research
08/09/2018

A quantum related-key attack based on Bernstein-Vazirani algorithm

Due to the powerful computing capability of quantum computers, cryptogra...
research
12/30/2020

Post-Quantum Security of the Bitcoin Backbone and Quantum Multi-Solution Bernoulli Search

Bitcoin and its underlying blockchain protocol have recently received si...
research
05/12/2020

An Economic Model for Quantum Key-Recovery Attacks against Ideal Ciphers

It has been established that quantum algorithms can solve several key cr...
research
03/25/2021

A Unified Framework For Quantum Unforgeability

In this paper, we continue the line of work initiated by Boneh and Zhand...
research
05/09/2022

On recovering block cipher secret keys in the cold boot attack setting

This paper presents a general strategy to recover a block cipher secret ...

Please sign up or login with your details

Forgot password? Click here to reset