Hi all,
Indeed, the algorithm is flawed. Here's a quick summary of what the algorithm does and where the issue is.
The algorithm begins but doing many grover searches in the key space with the predicate "Does the encryption of M with K matches the expected encryption on bits (2i,2i+1)?"
Assuming the proportion of keys that fulfill this property is exactly 1/4, we obtain, in 1 grover iteration, the exact quantum superposition of all matching keys.
Now, the idea is that the correct key is the only one that appears in all the superpositions. The Hadamard product allows to get the interstection of 2 quantum superpositions.
Thus, by iterating Hadamard products, we can recover the key.
There are 2 main problems:
- in the algorithm, computing a Hadamard product is not efficient, here it would be exponential.
- The claimed result is not possible: this algorithm would efficiently break any block cipher (and probably, beyond that, almost all cryptography) in black box. This violates lower bounds on the quantum security of the ideal cipher.
To summarize, any attack, classical or quantum, against AES (or any cipher), must, at some point, leverage a specific property of the cipher. This is not the case here.
Cheers,
Xavier