Abstract
Inspired by Hosoyamada and Sasaki (in: International conference on security and cryptography for networks, pp 386–403. Springer, 2018), we propose a new quantum meet-in-the-middle (QMITM) attack on r-round (\(r \ge 7\)) Feistel construction to reduce the time complexity, which is based on Guo et al. (Des Codes Cryptogr 80(3):587–618, 2016) classical meet-in-the-middle (MITM) attack. In our attack, we adjust the size of truncated differentials to balance the complexities between constructing the tables and querying firstly and introduce a quantum claw finding algorithm to solve the collision search problem in classical MITM attack. The total time complexities of our attack are only \(O({2^{2n/3}} \cdot n)\), \(O({2^{19n/24}} \cdot n)\) and \(O({2^{(r - 5)n/4}} \cdot n)\), when \(r = 7\), \(r = 8\) and \(r > 8\), lower than classical and quantum attacks. Moreover, our attack belongs to Q1 model and is more practical than other quantum attacks.
Similar content being viewed by others
Data Availability
All data generated or analyzed during this study are included in this published article.
References
Ambainis, A.: Quantum walk algorithm for element distinctness. SIAM J. Comput. 37(1), 210–239 (2007). https://doi.org/10.1137/S0097539705447311
Aoki, K., Guo, J., Matusiewicz, K., Sasaki, Y., Wang, L.: Preimages for step-reduced sha-2. In: Matsui, M. (ed.) Advances in Cryptology - ASIACRYPT 2009, pp. 578–597. Springer, Berlin (2009)
Bernstein, E., Vazirani, U.: Quantum complexity theory. SIAM J. Comput. 26(5), 1411 (1997)
Bonnetain, X., Naya-Plasencia, M., Schrottenloher, A.: On quantum slide attacks. In: Paterson, K.G., Stebila, D. (eds.) Selected Areas in Cryptography - SAC 2019, pp. 492–519. Springer International Publishing, Cham (2020)
Buhrman, H., Dürr, C., Heiligman, M., Høyer, P., Magniez, F., Santha, M., de Wolf, R.: Quantum algorithms for element distinctness. SIAM J. Comput. 34(6), 1324–1330 (2005). https://doi.org/10.1137/S0097539702402780
Coppersmith, D.: The data encryption standard (des) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994). https://doi.org/10.1147/rd.383.0243
Demirci, H., Selçuk, A.A.: A meet-in-the-middle attack on 8-round aes. In: Nyberg, K. (ed.) Fast Software Encryption, pp. 116–126. Springer, Berlin (2008)
Dong, X., Dong, B., Wang, X.: Quantum attacks on some feistel block ciphers. Des. Codes Crypt. 88, 1–25 (2020)
Dong, X., Li, Z., Wang, X.: Quantum cryptanalysis on some generalized feistel schemes. Sci. China Inf. Sci. 62(2), 22501 (2019)
Dong, X., Wang, X.: Quantum key-recovery attack on feistel structures. Sci. China Inf. Sci. 61(10), 1–7 (2018)
Feistel, H., Notz, W., Smith, J.: Some cryptographic techniques for machine-to-machine data communications. Proc. IEEE 63(11), 1545–1554 (1975). https://doi.org/10.1109/PROC.1975.10005
Giovannetti, V., Lloyd, S., Maccone, L.: Quantum random access memory. Phys. Rev. Lett. 100, 160501 (2008). https://doi.org/10.1103/PhysRevLett.100.160501
Grover, L.K.: Quantum computers can search arbitrarily large databases by a single query. Phys. Rev. Lett. 79(23), 4709 (1997)
Guo, J., Jean, J., Nikolić, I., Sasaki, Y.: Extended meet-in-the-middle attacks on some feistel constructions. Des. Codes Crypt. 80(3), 587–618 (2016)
Hosoyamada, A., Sasaki, Y.: Quantum demiric-selçuk meet-in-the-middle attacks: applications to 6-round generic feistel constructions. In: International conference on security and cryptography for networks, pp 386–403. Springer (2018)
Isobe, T., Shibutani, K.: All subkeys recovery attack on block ciphers: extending meet-in-the-middle approach. In: Knudsen, L.R., Wu, H. (eds.) Selected Areas in Cryptography, pp. 202–221. Springer, Berlin (2013)
Isobe, T., Shibutani, K.: Generic key recovery attack on feistel scheme. In: Sako, K., Sarkar, P. (eds.) Advances in Cryptology - ASIACRYPT 2013, pp. 464–485. Springer, Berlin (2013)
ISO/IEC: Information technology–security techniques–encryption algorithms–part 3: block ciphers (2010)
Ito, G., Hosoyamada, A., Matsumoto, R., Sasaki, Y., Iwata, T.: Quantum chosen-ciphertext attacks against feistel ciphers. In: Matsui, M. (ed.) Topics in Cryptology - CT-RSA 2019, pp. 391–411. Springer International Publishing, Cham (2019)
Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Crypto 2016-36th annual international cryptology conference, pp 207–237. Springer (2016)
Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Quantum differential and linear cryptanalysis. IACR Trans. Symmet. Cryptol. 2016(1), 71–94 (2016). https://doi.org/10.13154/tosc.v2016.i1.71-94
Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round feistel cipher and the random permutation. In: 2010 IEEE international symposium on information theory, pp 2682–2685. IEEE (2010)
Kuwakado, H., Morii, M.: Security on the quantum-type even-mansour cipher. In: 2012 international symposium on information theory and its applications, pp 312–316. IEEE (2012)
Leander, G., May, A.: Grover meets simon–quantumly attacking the fx-construction. In: International conference on the theory and application of cryptology and information security, pp 161–178. Springer (2017)
Knudsen, L.R.: The security of feistel ciphers with six rounds or less. J. Cryptol. 15(3), 207–222 (2002). https://doi.org/10.1007/s00145-002-9839-y
Santoli, T., Schaffner, C.: Using simon’s algorithm to attack symmetric-key cryptographic primitives. arXiv preprint arXiv:1603.07856 (2016)
Shi, T., Jin, C., Guan, J.: Collision attacks against aez-prf for authenticated encryption aez. China Commun. 15(2), 46–53 (2018)
Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 26(5), 1474–1483 (1997)
Todo, Y.: Upper bounds for the security of several feistel networks. In: Boyd, C., Simpson, L. (eds.) Information Security and Privacy, pp. 302–317. Springer, Berlin (2013)
Xie, H., Yang, L.: Using bernstein-vazirani algorithm to attack block ciphers. Des. Codes Crypt. 87(5), 1161–1182 (2019)
Xu, Y., Liu, W., Yu, W.: Quantum forgery attacks on copa, aes-copa and marble authenticated encryption algorithms. Quantum Inf. Process. 20(4), 1–21 (2021)
Zhao, S., Duan, X., Deng, Y., Peng, Z., Zhu, J.: Improved meet-in-the-middle attacks on generic feistel constructions. IEEE Access 7, 34416–34424 (2019). https://doi.org/10.1109/ACCESS.2019.2900765
Acknowledgements
This work was supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province (Grant No. SKLACSS-202103), BUPT Excellent Ph.D. Students Foundation (CX2022140) and the 13th Five-Year Plan National Cryptography Development Fund (MMJJ20180217).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Xu, Y., Yuan, Z. Quantum meet-in-the-middle attack on Feistel construction. Quantum Inf Process 22, 155 (2023). https://doi.org/10.1007/s11128-022-03715-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-022-03715-2