• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Xu, Y. (Xu, Y..) [1] | Du, X. (Du, X..) [2] | Jia, M. (Jia, M..) [3] | Wang, X. (Wang, X..) [4] | Zou, J. (Zou, J..) [5]

Indexed by:

Scopus

Abstract:

E2 algorithm is one of the 15 candidate algorithms in the first round of AES collection. In this paper, taking E2-128 as an example, the quantum security analysis on E2 algorithm is proposed for the first time in quantum chosen-plaintext attack setting. First, a polynomial-time distinguisher on 4-round E2-128 is constructed with 212.1 quantum queries by taking the properties of the internal round function into consideration. Then, by extending the distinguisher 2 rounds backward, a 6-round quantum key recovery attack is achieved with the help of Grover-meet-Simon algorithm, whose time complexities gain a factor of 276, where the subkey length that can be recovered is 152 bits with the occupation of 560 qubits. Furthermore, when attacking r>6 rounds, 152+(r-6)×128-bit subkey needs to be guessed in time 276+(r-6)×64, which is 1252 of Grover’s quantum brute force search. Finally, we present a quantum attack against E2-128 with 288.1 quantum queries by taking initial transformation and terminal transformation into consideration. The result shows that the time complexity of the quantum attack is significantly reduced, and E2 algorithm is safe enough to resist quantum attack. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.

Keyword:

E2 algorithm Grover-meet-Simon algorithm Grover’s algorithm Quantum cryptanalysis Simon’s algorithm

Community:

  • [ 1 ] [Xu Y.]College of Mathematics and Statistics, Northwest Normal University, Anning East, Gansu, Lanzhou, 730070, China
  • [ 2 ] [Du X.]College of Mathematics and Statistics, Northwest Normal University, Anning East, Gansu, Lanzhou, 730070, China
  • [ 3 ] [Du X.]Key Laboratory of Cryptography and Data Analytics, Northwest Normal University, Anning East, Gansu, Lanzhou, 730070, China
  • [ 4 ] [Du X.]Gansu Provincial Research Center for Basic Disciplines of Mathematics and Statistics, Northwest Normal University, Anning East, Gansu, Lanzhou, 730070, China
  • [ 5 ] [Jia M.]College of Mathematics and Statistics, Northwest Normal University, Anning East, Gansu, Lanzhou, 730070, China
  • [ 6 ] [Wang X.]College of Mathematics and Statistics, Northwest Normal University, Anning East, Gansu, Lanzhou, 730070, China
  • [ 7 ] [Zou J.]College of Computer and Data Science, Fuzhou University, Fujian, Fuzhou, 350108, China
  • [ 8 ] [Zou J.]Key Lab of Information Security of Network Systems, Key Lab of Information Security of Network Systems, Fuzhou University, Fujian, Fuzhou, 350108, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

Quantum Information Processing

ISSN: 1570-0755

Year: 2025

Issue: 2

Volume: 24

2 . 2 0 0

JCR@2023

CAS Journal Grade:3

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Affiliated Colleges:

Online/Total:122/10798596
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1