Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts

نویسندگان

  • Gorjan Alagic
  • Alexander Russell
چکیده

Recent results of Kaplan et al., building on previous work by Kuwakado and Morii, have shown that a wide variety of classically-secure symmetric-key cryptosystems are completely broken when exposed to quantum CPA attacks. In such an attack, the quantum adversary has the ability to query the cryptographic functionality in superposition. The vulnerable cryptosystems include the Even-Mansour block cipher, the three-round Feistel network, the Encrypted-CBC-MAC, and many others. In this work, we study simple algebraic adaptations of such schemes that replace (Z/2)n addition with operations over alternate finite groups— such as Z/2n—and provide evidence that these adaptations are secure against quantum CPA attacks. These adaptations furthermore retain the classical security properties (and basic structural features) enjoyed by the original schemes. We establish security by treating the (quantum) hardness of the wellstudied Hidden Shift problem as a basic cryptographic assumption. We observe that this problem has a number of attractive features in this cryptographic context, including random self-reducibility, hardness amplification, and—in many cases of interest—a reduction from the “search version” to the “decisional version.” We then establish, under this assumption, the security of several such hidden-shift adaptations of symmetrickey constructions against quantum CPA attack. We show that a Hidden Shift version of the Even-Mansour block cipher yields a quantumsecure pseudorandom function, and that a Hidden Shift version of the Encrypted CBC-MAC yields a collision-resistant hash function. Finally, we observe that such adaptations frustrate the direct Simon’s algorithmbased attacks in more general circumstances, e.g., Feistel networks and slide attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Breaking Symmetric Cryptosystems Using Quantum Period Finding

Due to Shor’s algorithm, quantum computers are a severe threat for public key cryptography. This motivated the cryptographic community to search for quantum-safe solutions. On the other hand, the impact of quantum computing on secret key cryptography is much less understood. In this paper, we consider attacks where an adversary can query an oracle implementing a cryptographic primitive in a qua...

متن کامل

Quantum Key Distribution Protocols: A Survey

Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. The security of most modern cryptographic systems of key distribution mechanism is based on computational complexity and the extraordinary time needed to break the code. Qua...

متن کامل

SECURITY USING QUANTUM KEY DISTRIBUTION PROTOCOLS (QKDPs)

Most cryptographic mechanisms such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. Quantum Key Distribution or Quantum Cryptography is attracting much attention as a solution of the problem of Key Distribution; QKD offers unconditionally secure communicatio...

متن کامل

Post - Quantum Cryptography Using Complexity Doctoral

In order to cope with new technologies such as quantum computing and the possibility of developing new algorithms, new cryptosystems should be developed based on a diverse set of unrelated complexity assumptions so that one technique will not break more than a handful of systems. As demonstrated by Shor in 1994, quantum algorithms are known to break traditional cryptosystems based on RSA and Di...

متن کامل

Secure Key Exchange Protocol based on Virtual Proof of Reality

Securely sharing the same secret key among multiple parties is the main concern in symmetric cryptography that is the workhorse of modern cryptography due to its simplicity and fast speed. Typically asymmetric cryptography is used to set up a shared secret between parties, after which the switch to symmetric cryptography can be made. In this paper, we introduce a novel key exchange protocol bas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016