Paper 2022/060
Quantum Boomerang Attacks and Some Applications
Paul Frixons, María Naya-Plasencia, and André Schrottenloher
Abstract
In this paper, we study quantum key-recovery attacks on block ciphers. While it is well known that a quantum adversary can generically speed up an exhaustive search of the key, much less is known on how to use specific vulnerabilities of the cipher to accelerate this procedure. In this context, we show how to convert classical boomerang and mixing boomerang attacks into efficient quantum key-recovery attacks. In some cases, we can even obtain a quadratic speedup, the same as simple differential attacks. We apply this technique to a 5-round attack on SAFER++.
Note: Full version of the paper.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. Major revision. SAC 2021
- Keywords
- boomerang attackpost-quantum securitymixing boomerang attackSAFER++AES
- Contact author(s)
-
andre schrottenloher @ m4x org
maria naya_plasencia @ inria fr
paul frixons @ inria fr - History
- 2022-01-18: received
- Short URL
- https://ia.cr/2022/060
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/060, author = {Paul Frixons and María Naya-Plasencia and André Schrottenloher}, title = {Quantum Boomerang Attacks and Some Applications}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/060}, year = {2022}, url = {https://eprint.iacr.org/2022/060} }