Skip to main content
Log in

Quantum meet-in-the-middle attack on Feistel construction

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Inspired by Hosoyamada and Sasaki (in: International conference on security and cryptography for networks, pp 386–403. Springer, 2018), we propose a new quantum meet-in-the-middle (QMITM) attack on r-round (\(r \ge 7\)) Feistel construction to reduce the time complexity, which is based on Guo et al. (Des Codes Cryptogr 80(3):587–618, 2016) classical meet-in-the-middle (MITM) attack. In our attack, we adjust the size of truncated differentials to balance the complexities between constructing the tables and querying firstly and introduce a quantum claw finding algorithm to solve the collision search problem in classical MITM attack. The total time complexities of our attack are only \(O({2^{2n/3}} \cdot n)\), \(O({2^{19n/24}} \cdot n)\) and \(O({2^{(r - 5)n/4}} \cdot n)\), when \(r = 7\), \(r = 8\) and \(r > 8\), lower than classical and quantum attacks. Moreover, our attack belongs to Q1 model and is more practical than other quantum attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Data Availability

All data generated or analyzed during this study are included in this published article.

References

  1. Ambainis, A.: Quantum walk algorithm for element distinctness. SIAM J. Comput. 37(1), 210–239 (2007). https://doi.org/10.1137/S0097539705447311

    Article  MathSciNet  MATH  Google Scholar 

  2. Aoki, K., Guo, J., Matusiewicz, K., Sasaki, Y., Wang, L.: Preimages for step-reduced sha-2. In: Matsui, M. (ed.) Advances in Cryptology - ASIACRYPT 2009, pp. 578–597. Springer, Berlin (2009)

    Chapter  Google Scholar 

  3. Bernstein, E., Vazirani, U.: Quantum complexity theory. SIAM J. Comput. 26(5), 1411 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  4. Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: On quantum slide attacks. In: Paterson, K.G., Stebila, D. (eds.) Selected Areas in Cryptography - SAC 2019, pp. 492–519. Springer International Publishing, Cham (2020)

    Chapter  Google Scholar 

  5. Buhrman, H., Dürr, C., Heiligman, M., Høyer, P., Magniez, F., Santha, M., de Wolf, R.: Quantum algorithms for element distinctness. SIAM J. Comput. 34(6), 1324–1330 (2005). https://doi.org/10.1137/S0097539702402780

    Article  MathSciNet  MATH  Google Scholar 

  6. Coppersmith, D.: The data encryption standard (des) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994). https://doi.org/10.1147/rd.383.0243

    Article  MATH  Google Scholar 

  7. Demirci, H., Selçuk, A.A.: A meet-in-the-middle attack on 8-round aes. In: Nyberg, K. (ed.) Fast Software Encryption, pp. 116–126. Springer, Berlin (2008)

    Chapter  Google Scholar 

  8. Dong, X., Dong, B., Wang, X.: Quantum attacks on some feistel block ciphers. Des. Codes Crypt. 88, 1–25 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  9. Dong, X., Li, Z., Wang, X.: Quantum cryptanalysis on some generalized feistel schemes. Sci. China Inf. Sci. 62(2), 22501 (2019)

    Article  MathSciNet  Google Scholar 

  10. Dong, X., Wang, X.: Quantum key-recovery attack on feistel structures. Sci. China Inf. Sci. 61(10), 1–7 (2018)

    Article  Google Scholar 

  11. Feistel, H., Notz, W., Smith, J.: Some cryptographic techniques for machine-to-machine data communications. Proc. IEEE 63(11), 1545–1554 (1975). https://doi.org/10.1109/PROC.1975.10005

    Article  Google Scholar 

  12. Giovannetti, V., Lloyd, S., Maccone, L.: Quantum random access memory. Phys. Rev. Lett. 100, 160501 (2008). https://doi.org/10.1103/PhysRevLett.100.160501

    Article  ADS  MathSciNet  MATH  Google Scholar 

  13. Grover, L.K.: Quantum computers can search arbitrarily large databases by a single query. Phys. Rev. Lett. 79(23), 4709 (1997)

    Article  ADS  Google Scholar 

  14. Guo, J., Jean, J., Nikolić, I., Sasaki, Y.: Extended meet-in-the-middle attacks on some feistel constructions. Des. Codes Crypt. 80(3), 587–618 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  15. Hosoyamada, A., Sasaki, Y.: Quantum demiric-selçuk meet-in-the-middle attacks: applications to 6-round generic feistel constructions. In: International conference on security and cryptography for networks, pp 386–403. Springer (2018)

  16. Isobe, T., Shibutani, K.: All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach. In: Knudsen, L.R., Wu, H. (eds.) Selected Areas in Cryptography, pp. 202–221. Springer, Berlin (2013)

    Chapter  MATH  Google Scholar 

  17. Isobe, T., Shibutani, K.: Generic key recovery attack on feistel scheme. In: Sako, K., Sarkar, P. (eds.) Advances in Cryptology - ASIACRYPT 2013, pp. 464–485. Springer, Berlin (2013)

    Chapter  Google Scholar 

  18. ISO/IEC: Information technology–security techniques–encryption algorithms–part 3: block ciphers (2010)

  19. Ito, G., Hosoyamada, A., Matsumoto, R., Sasaki, Y., Iwata, T.: Quantum chosen-ciphertext attacks against feistel ciphers. In: Matsui, M. (ed.) Topics in Cryptology - CT-RSA 2019, pp. 391–411. Springer International Publishing, Cham (2019)

    Chapter  Google Scholar 

  20. Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Crypto 2016-36th annual international cryptology conference, pp 207–237. Springer (2016)

  21. Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Quantum differential and linear cryptanalysis. IACR Trans. Symmet. Cryptol. 2016(1), 71–94 (2016). https://doi.org/10.13154/tosc.v2016.i1.71-94

    Article  MATH  Google Scholar 

  22. Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round feistel cipher and the random permutation. In: 2010 IEEE international symposium on information theory, pp 2682–2685. IEEE (2010)

  23. Kuwakado, H., Morii, M.: Security on the quantum-type even-mansour cipher. In: 2012 international symposium on information theory and its applications, pp 312–316. IEEE (2012)

  24. Leander, G., May, A.: Grover meets simon–quantumly attacking the fx-construction. In: International conference on the theory and application of cryptology and information security, pp 161–178. Springer (2017)

  25. Knudsen, L.R.: The security of feistel ciphers with six rounds or less. J. Cryptol. 15(3), 207–222 (2002). https://doi.org/10.1007/s00145-002-9839-y

    Article  MathSciNet  MATH  Google Scholar 

  26. Santoli, T., Schaffner, C.: Using simon’s algorithm to attack symmetric-key cryptographic primitives. arXiv preprint arXiv:1603.07856 (2016)

  27. Shi, T., Jin, C., Guan, J.: Collision attacks against aez-prf for authenticated encryption aez. China Commun. 15(2), 46–53 (2018)

    Article  Google Scholar 

  28. Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26(5), 1474–1483 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  29. Todo, Y.: Upper bounds for the security of several feistel networks. In: Boyd, C., Simpson, L. (eds.) Information Security and Privacy, pp. 302–317. Springer, Berlin (2013)

    Chapter  MATH  Google Scholar 

  30. Xie, H., Yang, L.: Using bernstein-vazirani algorithm to attack block ciphers. Des. Codes Crypt. 87(5), 1161–1182 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  31. Xu, Y., Liu, W., Yu, W.: Quantum forgery attacks on copa, aes-copa and marble authenticated encryption algorithms. Quantum Inf. Process. 20(4), 1–21 (2021)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  32. Zhao, S., Duan, X., Deng, Y., Peng, Z., Zhu, J.: Improved meet-in-the-middle attacks on generic feistel constructions. IEEE Access 7, 34416–34424 (2019). https://doi.org/10.1109/ACCESS.2019.2900765

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province (Grant No. SKLACSS-202103), BUPT Excellent Ph.D. Students Foundation (CX2022140) and the 13th Five-Year Plan National Cryptography Development Fund (MMJJ20180217).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Yuan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, Y., Yuan, Z. Quantum meet-in-the-middle attack on Feistel construction. Quantum Inf Process 22, 155 (2023). https://doi.org/10.1007/s11128-022-03715-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-022-03715-2

Keywords

Navigation