U.S. flag   An unofficial archive of your favorite United States government website
Presentation

Quantum Collision Attack with Respect to Primitive Security Margin

March 9, 2022

Presenters

Yu Sasaki - NIST/NTT

Description

Abstract. Quantum computers can often accelerate symmetric-key cryptanalysis. Meanwhile, it is rare that quantum computers offer new cryptanalytic approaches. Particularly, the security margin of a primitive is evaluated by the ratio of the number of attack rounds to the total number of rounds. When there exists some classical cryptanalysis on X rounds against some scheme, quantum computers can reduce its complexity, but may not provide new attacks that can break more than X rounds. In this talk, I will explain that, for hash collisions, quantum computers may break more rounds than the classical computers do. The idea is then demonstrated for AES hashing modes, SHA-256, and SHA-512.

The presenter is affiliated with the NTT Social Informatics Laboratories (Japan) and is currently at NIST as a foreign guest researcher.

Presented at

Crypto Reading Club talk on 2022-Mar-09

Parent Project

See: Crypto Reading Club

Related Topics

Security and Privacy: cryptography

Created June 29, 2022