PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Searching for an Efficient System of Equations Defining the AES Sbox for the QUBO Problem

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The time complexity of solving the QUBO problem depends mainly on the number of logical variables in the problem. This paper focuses mainly on finding a system of equations that uniquely defines the Sbox of the AES cipher and simultaneously allows us to obtain the smallest known optimization problem in the QUBO form for the algebraic attack on the AES cipher. A novel method of searching for an efficient system of equations using linear-feedback shift registers has been presented in order to perform that task efficiently. Transformation of the AES cipher to the QUBO problem, using the identified efficient system, is presented in this paper as well. This method allows us to reduce the target QUBO problem for AES- 128 by almost 500 logical variables, compared to our previous results, and allows us to perform the algebraic attack using quantum annealing four times faster.
Rocznik
Tom
Strony
30--37
Opis fizyczny
Bibliogr. 7 poz., rys., tab., wykr.
Twórcy
  • Institute of Mathematics and Cryptology Faculty of Cybernetics Military University of Technology, Warsaw, Poland
  • Institute of Mathematics and Cryptology Faculty of Cybernetics Military University of Technology, Warsaw, Poland
  • Cybersecurity Expert Department of Cryptology NASK National Research Institute, Warsaw, Poland
Bibliografia
  • [1] P. Shor, “Algorithms for Quantum Computation: Discrete Logarithms and Factoring”, IEEE Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, USA, 1994 (https://doi.org/10.1109/SFCS.1994.365700).
  • [2] C.H. Bennett, E. Bernstein, G. Brassard, and U. Vazirani, “Strengths and Weaknesses of Quantum Computing”, SIAM Journal on Computing, vol. 26, no. 5, pp. 1510– 1523, 1997 (https://doi.org/ 10.1137/S0097539796300933).
  • [3] L.K. Grover, “A Fast Quantum Mechanical Algorithm for Database Search”, Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, pp. 212–219 , 1996 (https://doi.org/ 10.1 145/237814.237866).
  • [4] E. Burek, M. Wronski, K. Mank, and M. Misztal, “Algebraic Attacks on Block Ciphers Using Quantum Annealing”, IEEE Transactions on Emerging Topics in Computing, vol. 10, no. 2, pp. 678– 689, 2022 (https://doi.org/10.1109/TETC.2022.3143152).
  • [5] I.G. Rosenberg, “Reduction of Bivalent Maximization to the Quadratic Case”, Cahiers du Centre d’Etudes de Recherche Operationnelle, vol. 17, pp. 71–74, 1975.
  • [6] N.T. Courtois and J. Pieprzyk, “Cryptanalysis of Block Ciphers with Overdefined Systems of Equations”, Lecture Notes in Computer Science, vol. 2501, 2002 (https://doi.org/ 10. 1007/3- 540- 36178- 2_ 17).
  • [7] A.I. Pakhomchik, V.V. Voloshinov, V.M. Vinokur, and G.B. Lesovik, “Converting of Boolean Expression to Linear Equations, Inequalities and QUBO Penalties for Cryptanalysis”, Algorithms, vol. 15, no. 2, art. no. 33, 2022 (https://doi.org/0.3390/a15020033).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-db34008b-66bb-4d3d-9e2a-c8363572e0dc
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.