论文标题
量子攻击无叠加查询:离线Simon的算法
Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm
论文作者
论文摘要
在对称的密码分析中,叠加查询的模型导致了令人惊讶的结果,由于Simon的周期捕获算法,在多项式时间内损坏了许多构造。但是这些攻击的实际含义仍然模糊。相比之下,对于量子对手而言,获得经典查询的结果仅令人印象深刻。在本文中,我们引入了一种新的量子算法,该算法以新颖的方式使用了Simon的子例程。我们设法在量子攻击者的背景下,利用密码系统的代数结构,仅限于经典查询和离线量子计算。相对于当前文献,我们获得了改进的量子时间/经典数据折衷,而仅使用Grover的算法将尽可能多的硬件要求(量子和经典)用作标准的详尽搜索。特别是,我们能够在量子时间$ \ tilde {o}(2^{n/3})$中打破偶数构造,并使用$ O(2^{n/3})$经典查询和$ o(n^2)$ qubits。此外,我们通过将数据复杂性从指数降低到多项式,以相同的时间复杂性来改善一些以前的叠加攻击。我们的方法可以通过两种互补的方式看待:\ emph {reuse}叠加查询在使用Grover的算法进行搜索期间,或者,由于其代数结构。我们提供了一个加密应用程序的列表,包括偶数构造,FX结构,一些海绵认证的加密模式等等。
In symmetric cryptanalysis, the model of superposition queries has led to surprising results, with many constructions being broken in polynomial time thanks to Simon's period-finding algorithm. But the practical implications of these attacks remain blurry. In contrast, the results obtained so far for a quantum adversary making classical queries only are less impressive. In this paper, we introduce a new quantum algorithm which uses Simon's subroutines in a novel way. We manage to leverage the algebraic structure of cryptosystems in the context of a quantum attacker limited to classical queries and offline quantum computations. We obtain improved quantum-time/classical-data tradeoffs with respect to the current literature, while using only as much hardware requirements (quantum and classical) as a standard exhaustive search with Grover's algorithm. In particular, we are able to break the Even-Mansour construction in quantum time $\tilde{O}(2^{n/3})$, with $O(2^{n/3})$ classical queries and $O(n^2)$ qubits only. In addition, we improve some previous superposition attacks by reducing the data complexity from exponential to polynomial, with the same time complexity. Our approach can be seen in two complementary ways: \emph{reusing} superposition queries during the iteration of a search using Grover's algorithm, or alternatively, removing the memory requirement in some quantum attacks based on a collision search, thanks to their algebraic structure. We provide a list of cryptographic applications, including the Even-Mansour construction, the FX construction, some Sponge authenticated modes of encryption, and many more.