The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers

Akinori HOSOYAMADA, Kazumaro AOKI

  • Full Text Views

    0

  • Cite this

Summary :

It has been said that security of symmetric key schemes is not so much affected by quantum computers, compared to public key schemes. However, recent works revealed that, in some specific situations, symmetric key schemes are also broken in polynomial time by adversaries with quantum computers. These works contain a quantum distinguishing attack on 3-round Feistel ciphers and a quantum key recovery attack on the Even-Mansour cipher by Kuwakado and Morii, in addition to the quantum forgery attack on CBC-MAC which is proposed independently by Kaplan et al., and by Santoli and Schaffner. Iterated Even-Mansour cipher is a simple but important block cipher, which can be regarded as an idealization of AES. Whether there exists an efficient quantum algorithm that can break iterated Even-Mansour cipher with independent subkeys is an important problem from the viewpoint of analyzing post-quantum security of block ciphers. Actually there is an efficient quantum attack on iterated Even-Mansour cipher by Kaplan et al., but their attack can only be applied in the case that all subkeys are the same. This paper shows that there is a polynomial time quantum algorithm that recovers partial keys of the iterated Even-Mansour cipher with independent subkeys, in a related-key setting. The related-key condition is somewhat strong, but our algorithm can recover subkeys with two related oracles. In addition, we also show that our algorithm can recover all keys of the i-round iterated Even-Mansour cipher, if we are allowed to access i related quantum oracles. To realize quantum related-key attacks, we extend Simon's quantum algorithm so that we can recover the hidden period of a function that is periodic only up to constant. Our technique is to take differential of the target function to make a double periodic function, and then apply Simon's algorithm.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E102-A No.1 pp.27-34
Publication Date
2019/01/01
Publicized
Online ISSN
1745-1337
DOI
10.1587/transfun.E102.A.27
Type of Manuscript
Special Section PAPER (Special Section on Cryptography and Information Security)
Category

Authors

Akinori HOSOYAMADA
  NTT Corporation
Kazumaro AOKI
  NTT Corporation

Keyword