New quantum algorithm proposing polynomial time attack on AES, too good to be real?

421 views
Skip to first unread message

Doge Protocol

unread,
Jul 24, 2022, 11:54:31 AM7/24/22
to pqc-forum
Came accross this paper today and wanted to bring to attention of this community.

Can community verify the claims in the paper? If substantiated, this is a big development.


Snippet from abstract:

We demonstrate how it can be used to search the keyspace of any block cipher that can be implemented on a quantum computer with the keyspace in superpositon. In particular we give a polynomial time attack on AES−128, AES−192 and AES−256.


Tony Arcieri

unread,
Jul 24, 2022, 12:00:37 PM7/24/22
to Doge Protocol, pqc-forum
I've seen a number of criticisms of this paper, and ePrint has withdrawn it.

One criticism, if I understand correctly, is that it relies on an oracle which outputs if two bits of the key are correct, which if it existed could also break AES classically.

--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/aa3c189e-8263-44dd-ae83-4fae718ba599n%40list.nist.gov.


--
Tony Arcieri

Xavier Bonnetain

unread,
Jul 24, 2022, 12:43:58 PM7/24/22
to pqc-forum
Hi all,

Indeed, the algorithm is flawed. Here's a quick summary of what the algorithm does and where the issue is.

The algorithm begins but doing many grover searches in the key space with the predicate "Does the encryption of M with K matches the expected encryption on bits (2i,2i+1)?"
Assuming the proportion of keys that fulfill this property is exactly 1/4, we obtain, in 1 grover iteration, the exact quantum superposition of all matching keys.
Now, the idea is that the correct key is the only one that appears in all the superpositions. The Hadamard product allows to get the interstection of 2 quantum superpositions.
Thus, by iterating Hadamard products, we can recover the key.

There are 2 main problems:
 - in the algorithm, computing a Hadamard product is not efficient, here it would be exponential.
 - The claimed result is not possible: this algorithm would efficiently break any block cipher (and probably, beyond that, almost all cryptography) in black box. This violates lower bounds on the quantum security of the ideal cipher.

To summarize, any attack, classical or quantum, against AES (or any cipher), must, at some point, leverage a specific property of the cipher. This is not the case here.

Cheers,
Xavier


Reply all
Reply to author
Forward
0 new messages