Quantum exhaustive key search with simplified-DES as a case study

To evaluate the security of a symmetric cryptosystem against any quantum attack, the symmetric algorithm must be first implemented on a quantum platform. In this study, a quantum implementation of a classical block cipher is presented. A quantum circuit for a classical block cipher of a polynomial size of quantum gates is proposed. The entire work has been tested on a quantum mechanics simulator called libquantum. First, the functionality of the proposed quantum cipher is verified and the experimental results are compared with those of the original classical version. Then, quantum attacks are conducted by using Grover’s algorithm to recover the secret key. The proposed quantum cipher is used as a black box for the quantum search. The quantum oracle is then queried over the produced ciphertext to mark the quantum state, which consists of plaintext and key qubits. The experimental results show that for a key of n-bit size and key space of N such that $$N=2^n$$N=2n, the key can be recovered in $$\mathcal {O} \left(\frac{\pi }{4}\sqrt{N} \right)$$Oπ4N computational steps.

[1]  山村 明弘,et al.  Quantum cryptanalysis of block ciphers (Algebraic Systems, Formal Languages and Computations) , 2000 .

[2]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[3]  Tanja Lange,et al.  Post-quantum cryptography , 2008, Nature.

[4]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[5]  Gilles Brassard,et al.  Quantum Counting , 1998, ICALP.

[6]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[7]  E. Lucero,et al.  Computing prime factors with a Josephson phase qubit quantum processor , 2012, Nature Physics.

[8]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[9]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[10]  Ralph Howard,et al.  Data encryption standard , 1987 .

[11]  Takashi Mihara,et al.  Quantum protocols for untrusted computations , 2007, J. Discrete Algorithms.

[12]  Robert Spalek,et al.  Quantum Fan-out is Powerful , 2005, Theory Comput..

[13]  Christof Zalka GROVER'S QUANTUM SEARCHING ALGORITHM IS OPTIMAL , 1997, quant-ph/9711070.

[14]  Bruce Schneier,et al.  The Twofish encryption algorithm: a 128-bit block cipher , 1999 .

[15]  Jaewan Kim,et al.  Secure sequential transmission of quantum information , 2015, Quantum Inf. Process..

[16]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[17]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[18]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[19]  B. Lanyon,et al.  Experimental demonstration of a compiled version of Shor's algorithm with quantum entanglement. , 2007, Physical review letters.

[20]  N. Mermin Quantum Computer Science: An Introduction , 2007 .

[21]  X-Q Zhou,et al.  Experimental realization of Shor's quantum factoring algorithm using qubit recycling , 2011, Nature Photonics.

[22]  Robert Spalek,et al.  Quantum Fanout is Powerful , 2005 .

[23]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[24]  Rubens Viana Ramos,et al.  Quantum protocols for zero-knowledge systems , 2010, Quantum Inf. Process..

[25]  Martin Roetteler,et al.  A note on quantum related-key attacks , 2013, Inf. Process. Lett..

[26]  Gilles Brassard,et al.  Tight bounds on quantum searching , 1996, quant-ph/9605034.

[27]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[28]  Michael J. Wiener,et al.  Cryptanalysis of Short RSA Secret Exponents (Abstract) , 1990, EUROCRYPT.

[29]  Edward F. Schaefer A Simplified Data Encryption Standard Algorithm , 1996, Cryptologia.

[30]  Igor L. Markov,et al.  Faster Quantum Number Factoring via Circuit Synthesis , 2013, ArXiv.

[31]  Brian A. Carter,et al.  Advanced Encryption Standard , 2007 .