• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Zhang, Zhongya (Zhang, Zhongya.) [1] | Wu, Wenling (Wu, Wenling.) [2] | Zou, Jian (Zou, Jian.) [3] (Scholars:邹剑)

Indexed by:

EI PKU

Abstract:

The development and application of quantum algorithms have exerted a profound influence on the design and analysis of cryptographic algorithms. Currently, the Grover search algorithm and Simon quantum period finding algorithm are the most widely used algorithms in the quantization of cryptographic analysis. However, as the quantization of birthday collision attack, BHT (Brassard, H∅yer, Tapp) quantum collision search algorithm has not been applied in cryptanalysis. It is of great significance to study the BHT algorithm for the analysis and application of cryptographic algorithms. By analyzing the multi-round EM (Even, Mansour) structure, the combination of collision search algorithm and differential key recovery attack is studied under classical and quantum conditions, what is more the multi-round EM structure is attacked with differential collision key recovery, and the attack is quantified from the perspective of BHT algorithm. The results demonstrate that the time complexity of the differential key recovery attack on r-round EM structure decreases from O(2p+n) to O(2p+n/2) and the speed is 2n/2 times faster when the differential probability is 2-p≥2-n/2 as under classical conditions. In the quantum conditions, when the differential probability is 2-p>2-n/3, the time complexity of differential collision key recovery attack based on BHT collision search is better than that based on Grover search, which shows the effectiveness of BHT algorithm on specific cryptanalysis. © 2021, Science Press. All right reserved.

Keyword:

Cryptography Learning algorithms Quantum computers Quantum theory

Community:

  • [ 1 ] [Zhang, Zhongya]Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing; 100190, China
  • [ 2 ] [Zhang, Zhongya]University of Chinese Academy of Sciences, Beijing; 100049, China
  • [ 3 ] [Zhang, Zhongya]Luoyang Normal University, Luoyang; 471934, China
  • [ 4 ] [Wu, Wenling]Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing; 100190, China
  • [ 5 ] [Wu, Wenling]University of Chinese Academy of Sciences, Beijing; 100049, China
  • [ 6 ] [Zou, Jian]College of Mathematics and Computer Science, Fuzhou University, Fuzhou; 350108, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

Computer Research and Development

ISSN: 1000-1239

CN: 11-1777/TP

Year: 2021

Issue: 12

Volume: 58

Page: 2811-2818

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 2

Online/Total:36/10106564
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1