International Association for Cryptologic Research

International Association
for Cryptologic Research

Transactions on Cryptographic Hardware and Embedded Systems, Volume 2022

Quantum Period Finding against Symmetric Primitives in Practice


Xavier Bonnetain
Université de Lorraine, CNRS, Inria

Samuel Jaques
University of Oxford


Keywords: Quantum Cryptanalysis, Quantum Circuits, Symmetric Cryptography, Simon's Algorithm


Abstract

We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, and estimate their cost to attack the MAC Chaskey, the block cipher PRINCE and the NIST lightweight finalist AEAD scheme Elephant. These attacks require a reasonable amount of qubits, comparable to the number of qubits required to break RSA-2048. They are faster than other collision algorithms, and the attacks against PRINCE and Chaskey are the most efficient known to date. As Elephant has a key smaller than its state size, the algorithm is less efficient and its cost ends up very close to or above the cost of exhaustive search. We also propose an optimized quantum circuit for boolean linear algebra as well as complete reversible implementations of PRINCE, Chaskey, spongent and Keccak which are of independent interest for quantum cryptanalysis. We stress that our attacks could be applied in the future against today’s communications, and recommend caution when choosing symmetric constructions for cases where long-term security is expected.

Publication

Transactions of Cryptographic Hardware and Embedded Systems, Volume 2022, Issue 1

Paper

Artifact

Artifact number
tches/2022/a6

Artifact published
February 26, 2022

README

tar.gz (406 KB)  

View on Github

License


BibTeX How to cite

Bonnetain, X., & Jaques, S. (2021). Quantum Period Finding against Symmetric Primitives in Practice. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(1), 1–27. https://doi.org/10.46586/tches.v2022.i1.1-27. Artifact available at https://artifacts.iacr.org/tches/2022/a6