期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Quantum key recovery attack on SIMON32/64 被引量:1
1
作者 Hui Liu Li Yang 《Cybersecurity》 EI CSCD 2021年第1期349-363,共15页
The quantum security of lightweight block ciphers is receiving more and more attention.However,the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search,while the quantum ... The quantum security of lightweight block ciphers is receiving more and more attention.However,the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search,while the quantum attacks combined with classical cryptanalysis methods haven’t been well studied.In this paper,we study quantum key recovery attack on SIMON32/64 using Quantum Amplitude Amplification algorithm in Q1 model.At first,we reanalyze the quantum circuit complexity of quantum exhaustive search on SIMON32/64.We estimate the Clifford gates count more accurately and reduce the T gate count.Also,the T-depth and full depth is reduced due to our minor modifications.Then,using four differentials given by Biryukov in FSE 2014 as our distinguisher,we give our quantum key recovery attack on 19-round SIMON32/64.We treat the two phases of key recovery attack as two QAA instances separately,and the first QAA instance consists of four sub-QAA instances.Then,we design the quantum circuit of these two QAA instances and estimate their corresponding quantum circuit complexity.We conclude that the quantum circuit of our quantum key recovery attack is lower than quantum exhaustive search.Our work firstly studies the quantum dedicated attack on SIMON32/64.And this is the first work to study the complexity of quantum dedicated attacks from the perspective of quantum circuit complexity,which is a more fine-grained analysis of quantum dedicated attacks’complexity. 展开更多
关键词 Quantum cryptanalysis Lightweight block ciphers Quantum amplitude amplification Differential cryptanalysis key recovery attack SIMON32/64
原文传递
Weak generalized self-shrinking generators
2
作者 Dong Lihua Hu Yupu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第2期407-411,共5页
The security of certain classes of the generalized self-shrinking sequence (GSS) generators is analyzed. Firstly, it is shown that the security of these GSS generators is equivalent to the security of the GSS genera... The security of certain classes of the generalized self-shrinking sequence (GSS) generators is analyzed. Firstly, it is shown that the security of these GSS generators is equivalent to the security of the GSS generators of the class-1, after which two effective key recovery attacks on the GSS generators of the class-1 are developed to evaluate their security. 展开更多
关键词 CRYPTOGRAPHY Stream cipher key recovery attacks Generalized self-shrinking sequence.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部