U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Presentation

Quantum Collision Attack with Respect to Primitive Security Margin

March 9, 2022

Presenters

Yu Sasaki - NIST/NTT

Description

Abstract. Quantum computers can often accelerate symmetric-key cryptanalysis. Meanwhile, it is rare that quantum computers offer new cryptanalytic approaches. Particularly, the security margin of a primitive is evaluated by the ratio of the number of attack rounds to the total number of rounds. When there exists some classical cryptanalysis on X rounds against some scheme, quantum computers can reduce its complexity, but may not provide new attacks that can break more than X rounds. In this talk, I will explain that, for hash collisions, quantum computers may break more rounds than the classical computers do. The idea is then demonstrated for AES hashing modes, SHA-256, and SHA-512.

The presenter is affiliated with the NTT Social Informatics Laboratories (Japan) and is currently at NIST as a foreign guest researcher.

Presented at

Crypto Reading Club talk on 2022-Mar-09

Parent Project

See: Crypto Reading Club

Related Topics

Security and Privacy: cryptography

Created June 29, 2022