Quantum Boomerang Attacks and Some Applications View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2022-03-27

AUTHORS

Paul Frixons , María Naya-Plasencia , André Schrottenloher

ABSTRACT

In this paper, we study quantum key-recovery attacks on block ciphers. While it is well known that a quantum adversary can generically speed up an exhaustive search of the key, much less is known on how to use specific vulnerabilities of the cipher to accelerate this procedure. In this context, we show how to convert classical boomerang and mixing boomerang attacks into efficient quantum key-recovery attacks. In some cases, we can even obtain a quadratic speedup, the same as simple differential attacks. We apply this technique to a 5-round attack on SAFER++. More... »

PAGES

332-352

Book

TITLE

Selected Areas in Cryptography

ISBN

978-3-030-99276-7
978-3-030-99277-4

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-030-99277-4_16

DOI

http://dx.doi.org/10.1007/978-3-030-99277-4_16

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1146588583


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/02", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Physical Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0206", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Quantum Physics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Inria, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "Orange Labs, Caen, France", 
            "Inria, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Frixons", 
        "givenName": "Paul", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Inria, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "Inria, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naya-Plasencia", 
        "givenName": "Mar\u00eda", 
        "id": "sg:person.013206304341.94", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Cryptology Group, CWI, Amsterdam, The Netherlands", 
          "id": "http://www.grid.ac/institutes/grid.6054.7", 
          "name": [
            "Cryptology Group, CWI, Amsterdam, The Netherlands"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Schrottenloher", 
        "givenName": "Andr\u00e9", 
        "id": "sg:person.07436415541.40", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07436415541.40"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2022-03-27", 
    "datePublishedReg": "2022-03-27", 
    "description": "In this paper, we study quantum key-recovery attacks on block ciphers. While it is well known that a quantum adversary can generically speed up an exhaustive search of the key, much less is known on how to use specific vulnerabilities of the cipher to accelerate this procedure. In this context, we show how to convert classical boomerang and mixing boomerang attacks into efficient quantum key-recovery attacks. In some cases, we can even obtain a quadratic speedup, the same as simple differential attacks. We apply this technique to a 5-round attack on SAFER++.", 
    "editor": [
      {
        "familyName": "AlTawy", 
        "givenName": "Riham", 
        "type": "Person"
      }, 
      {
        "familyName": "H\u00fclsing", 
        "givenName": "Andreas", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-030-99277-4_16", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-030-99276-7", 
        "978-3-030-99277-4"
      ], 
      "name": "Selected Areas in Cryptography", 
      "type": "Book"
    }, 
    "keywords": [
      "quantum key-recovery attacks", 
      "quantum adversaries", 
      "quadratic speedup", 
      "boomerang", 
      "technique", 
      "applications", 
      "search", 
      "cases", 
      "speedup", 
      "key", 
      "paper", 
      "procedure", 
      "context", 
      "exhaustive search", 
      "attacks", 
      "adversary", 
      "cipher", 
      "differential attacks", 
      "key recovery attack", 
      "block cipher", 
      "vulnerability", 
      "specific vulnerabilities", 
      "boomerang attack"
    ], 
    "name": "Quantum Boomerang Attacks and Some Applications", 
    "pagination": "332-352", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1146588583"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-030-99277-4_16"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-030-99277-4_16", 
      "https://app.dimensions.ai/details/publication/pub.1146588583"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T07:00", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_64.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-030-99277-4_16"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-99277-4_16'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-99277-4_16'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-99277-4_16'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-99277-4_16'


 

This table displays all metadata directly associated to this object as RDF triples.

104 TRIPLES      22 PREDICATES      47 URIs      40 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-030-99277-4_16 schema:about anzsrc-for:02
2 anzsrc-for:0206
3 schema:author N7d17e574624f4c7bbe3d51db1673abd2
4 schema:datePublished 2022-03-27
5 schema:datePublishedReg 2022-03-27
6 schema:description In this paper, we study quantum key-recovery attacks on block ciphers. While it is well known that a quantum adversary can generically speed up an exhaustive search of the key, much less is known on how to use specific vulnerabilities of the cipher to accelerate this procedure. In this context, we show how to convert classical boomerang and mixing boomerang attacks into efficient quantum key-recovery attacks. In some cases, we can even obtain a quadratic speedup, the same as simple differential attacks. We apply this technique to a 5-round attack on SAFER++.
7 schema:editor Ne762873a75404a4a9315909b332bbc71
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N24c820798fe14e87bd19cd4bfc63c448
11 schema:keywords adversary
12 applications
13 attacks
14 block cipher
15 boomerang
16 boomerang attack
17 cases
18 cipher
19 context
20 differential attacks
21 exhaustive search
22 key
23 key recovery attack
24 paper
25 procedure
26 quadratic speedup
27 quantum adversaries
28 quantum key-recovery attacks
29 search
30 specific vulnerabilities
31 speedup
32 technique
33 vulnerability
34 schema:name Quantum Boomerang Attacks and Some Applications
35 schema:pagination 332-352
36 schema:productId N3327bb04e0cf4cbfa8fb9732b4b84e6b
37 Ne9a3b51bc17742cba1f9f47d8d7ec315
38 schema:publisher N60f682968d6d42a6863181b0ca6f1082
39 schema:sameAs https://app.dimensions.ai/details/publication/pub.1146588583
40 https://doi.org/10.1007/978-3-030-99277-4_16
41 schema:sdDatePublished 2022-10-01T07:00
42 schema:sdLicense https://scigraph.springernature.com/explorer/license/
43 schema:sdPublisher N340fc1558829496b858483be48c48f84
44 schema:url https://doi.org/10.1007/978-3-030-99277-4_16
45 sgo:license sg:explorer/license/
46 sgo:sdDataset chapters
47 rdf:type schema:Chapter
48 N156d9562024249caa969213364ddeb6e rdf:first N740c53346b7b4ea99d1b6cd283e8e744
49 rdf:rest rdf:nil
50 N2028cec2eaa8471c93ca364e6e4317a1 rdf:first sg:person.07436415541.40
51 rdf:rest rdf:nil
52 N24c820798fe14e87bd19cd4bfc63c448 schema:isbn 978-3-030-99276-7
53 978-3-030-99277-4
54 schema:name Selected Areas in Cryptography
55 rdf:type schema:Book
56 N3327bb04e0cf4cbfa8fb9732b4b84e6b schema:name dimensions_id
57 schema:value pub.1146588583
58 rdf:type schema:PropertyValue
59 N340fc1558829496b858483be48c48f84 schema:name Springer Nature - SN SciGraph project
60 rdf:type schema:Organization
61 N3f8ac4d6f4874230b071213b81eaa2a4 schema:affiliation grid-institutes:grid.5328.c
62 schema:familyName Frixons
63 schema:givenName Paul
64 rdf:type schema:Person
65 N4bf0fe1008834db0b3046b3117bc441f schema:familyName AlTawy
66 schema:givenName Riham
67 rdf:type schema:Person
68 N60f682968d6d42a6863181b0ca6f1082 schema:name Springer Nature
69 rdf:type schema:Organisation
70 N740c53346b7b4ea99d1b6cd283e8e744 schema:familyName Hülsing
71 schema:givenName Andreas
72 rdf:type schema:Person
73 N7d17e574624f4c7bbe3d51db1673abd2 rdf:first N3f8ac4d6f4874230b071213b81eaa2a4
74 rdf:rest Nb55e7a167bb546358a5b2c8b1262763b
75 Nb55e7a167bb546358a5b2c8b1262763b rdf:first sg:person.013206304341.94
76 rdf:rest N2028cec2eaa8471c93ca364e6e4317a1
77 Ne762873a75404a4a9315909b332bbc71 rdf:first N4bf0fe1008834db0b3046b3117bc441f
78 rdf:rest N156d9562024249caa969213364ddeb6e
79 Ne9a3b51bc17742cba1f9f47d8d7ec315 schema:name doi
80 schema:value 10.1007/978-3-030-99277-4_16
81 rdf:type schema:PropertyValue
82 anzsrc-for:02 schema:inDefinedTermSet anzsrc-for:
83 schema:name Physical Sciences
84 rdf:type schema:DefinedTerm
85 anzsrc-for:0206 schema:inDefinedTermSet anzsrc-for:
86 schema:name Quantum Physics
87 rdf:type schema:DefinedTerm
88 sg:person.013206304341.94 schema:affiliation grid-institutes:grid.5328.c
89 schema:familyName Naya-Plasencia
90 schema:givenName María
91 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94
92 rdf:type schema:Person
93 sg:person.07436415541.40 schema:affiliation grid-institutes:grid.6054.7
94 schema:familyName Schrottenloher
95 schema:givenName André
96 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07436415541.40
97 rdf:type schema:Person
98 grid-institutes:grid.5328.c schema:alternateName Inria, Paris, France
99 schema:name Inria, Paris, France
100 Orange Labs, Caen, France
101 rdf:type schema:Organization
102 grid-institutes:grid.6054.7 schema:alternateName Cryptology Group, CWI, Amsterdam, The Netherlands
103 schema:name Cryptology Group, CWI, Amsterdam, The Netherlands
104 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...