Quantum Truncated Differential Attacks Using Convolutions
Home Research Details
Aurel Pichollet-Mugnier, André Schrottenloher

Quantum Truncated Differential Attacks Using Convolutions

0.0 (0 ratings)

Introduction

Quantum truncated differential attacks using convolutions. Discover a new quantum truncated differential key-recovery attack on block ciphers, leveraging quantum convolutions for improved speedups on QARMAv2-64 & AES-256.

0
1 views

Abstract

This paper focuses on quantum key-recovery attacks on block ciphers. Previous works on quantum differential and truncated differential attacks like [Kaplan et al., ToSC 2016] have shown that classical algorithms for key-recovery, typically based on generating differential pairs and sieving them, can be accelerated by up to a quadratic speedup using variants of quantum search, quantum amplitude amplification, and quantum collision-finding.>br/> In this paper, we introduce a new quantum truncated differential key-recovery attack, which leverages the quantum convolution algorithm introduced in [Schrottenloher, CRYPTO 2022] and previously used in linear cryptanalysis. We adapt this algorithm to the case of differential cryptanalysis, by rewriting the probability of a differential of an n-bit cipher as a convolution of functions with 2n-bit input. We then construct a quantum state whose amplitudes encode the probability of the differential for different key guesses, and use this as the starting point of a quantum search. In some cases (although not on practical ciphers so far), the speedup is better than quadratic compared to classical attacks. We also extend the framework to related-key differential attacks.We give applications to a 9-round attack on QARMAv2-64 adapted from [Ahmadian et al., DCC 2024] and a 12-round related-key attack on AES-256 from [Boura et al., CRYPTO 2023], which show improvement over classical attacks and over Kaplan et al.’s strategy when taking into account the amount of memory and the type of quantum memory used (as our attack requires only quantum-accessible classical memory).



Full Text

You need to be logged in to view the full text and Download file of this article - Quantum Truncated Differential Attacks Using Convolutions from IACR Transactions on Symmetric Cryptology .

Login to View Full Text And Download

Comments


You need to be logged in to post a comment.