Cargando…

Quantum exhaustive key search with simplified-DES as a case study

To evaluate the security of a symmetric cryptosystem against any quantum attack, the symmetric algorithm must be first implemented on a quantum platform. In this study, a quantum implementation of a classical block cipher is presented. A quantum circuit for a classical block cipher of a polynomial s...

Descripción completa

Detalles Bibliográficos
Autores principales: Almazrooie, Mishal, Samsudin, Azman, Abdullah, Rosni, Mutter, Kussay N.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer International Publishing 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5013009/
https://www.ncbi.nlm.nih.gov/pubmed/27652067
http://dx.doi.org/10.1186/s40064-016-3159-4
_version_ 1782452085074165760
author Almazrooie, Mishal
Samsudin, Azman
Abdullah, Rosni
Mutter, Kussay N.
author_facet Almazrooie, Mishal
Samsudin, Azman
Abdullah, Rosni
Mutter, Kussay N.
author_sort Almazrooie, Mishal
collection PubMed
description To evaluate the security of a symmetric cryptosystem against any quantum attack, the symmetric algorithm must be first implemented on a quantum platform. In this study, a quantum implementation of a classical block cipher is presented. A quantum circuit for a classical block cipher of a polynomial size of quantum gates is proposed. The entire work has been tested on a quantum mechanics simulator called libquantum. First, the functionality of the proposed quantum cipher is verified and the experimental results are compared with those of the original classical version. Then, quantum attacks are conducted by using Grover’s algorithm to recover the secret key. The proposed quantum cipher is used as a black box for the quantum search. The quantum oracle is then queried over the produced ciphertext to mark the quantum state, which consists of plaintext and key qubits. The experimental results show that for a key of n-bit size and key space of N such that [Formula: see text] , the key can be recovered in [Formula: see text] computational steps.
format Online
Article
Text
id pubmed-5013009
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher Springer International Publishing
record_format MEDLINE/PubMed
spelling pubmed-50130092016-09-20 Quantum exhaustive key search with simplified-DES as a case study Almazrooie, Mishal Samsudin, Azman Abdullah, Rosni Mutter, Kussay N. Springerplus Research To evaluate the security of a symmetric cryptosystem against any quantum attack, the symmetric algorithm must be first implemented on a quantum platform. In this study, a quantum implementation of a classical block cipher is presented. A quantum circuit for a classical block cipher of a polynomial size of quantum gates is proposed. The entire work has been tested on a quantum mechanics simulator called libquantum. First, the functionality of the proposed quantum cipher is verified and the experimental results are compared with those of the original classical version. Then, quantum attacks are conducted by using Grover’s algorithm to recover the secret key. The proposed quantum cipher is used as a black box for the quantum search. The quantum oracle is then queried over the produced ciphertext to mark the quantum state, which consists of plaintext and key qubits. The experimental results show that for a key of n-bit size and key space of N such that [Formula: see text] , the key can be recovered in [Formula: see text] computational steps. Springer International Publishing 2016-09-06 /pmc/articles/PMC5013009/ /pubmed/27652067 http://dx.doi.org/10.1186/s40064-016-3159-4 Text en © The Author(s) 2016 Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
spellingShingle Research
Almazrooie, Mishal
Samsudin, Azman
Abdullah, Rosni
Mutter, Kussay N.
Quantum exhaustive key search with simplified-DES as a case study
title Quantum exhaustive key search with simplified-DES as a case study
title_full Quantum exhaustive key search with simplified-DES as a case study
title_fullStr Quantum exhaustive key search with simplified-DES as a case study
title_full_unstemmed Quantum exhaustive key search with simplified-DES as a case study
title_short Quantum exhaustive key search with simplified-DES as a case study
title_sort quantum exhaustive key search with simplified-des as a case study
topic Research
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5013009/
https://www.ncbi.nlm.nih.gov/pubmed/27652067
http://dx.doi.org/10.1186/s40064-016-3159-4
work_keys_str_mv AT almazrooiemishal quantumexhaustivekeysearchwithsimplifieddesasacasestudy
AT samsudinazman quantumexhaustivekeysearchwithsimplifieddesasacasestudy
AT abdullahrosni quantumexhaustivekeysearchwithsimplifieddesasacasestudy
AT mutterkussayn quantumexhaustivekeysearchwithsimplifieddesasacasestudy