Description
The security of modern cryptosystems relies on computational assumptions, which may be challenged by the advent of large-scale quantum computing devices.<br/> While Shor's algorithm is known to break today's most popular public-key schemes, secret-key cryptosystems are generally expected to retain half of their pre-quantum bits of security. However, the precise advantage of quantum attacks cannot be determined without a dedicated analysis.<br/> In this talk, we will focus on key-recovery attacks against block ciphers. These attacks are often categorized in two scenarios, depending on the type of black-box access allowed to the adversary: either a classical query access, or a "quantum" query access where the black-box is part of the adversary's quantum algorithm. Attacks with classical queries, which are deemed more realistic, have so far complied with the rule of halving security levels.<br/> On the contrary, attacks with quantum queries can break some classically secure designs which exhibit a strong algebraic structure (Kuwakado & Morii, ISIT 2010).<br/> Exploiting this structure with classical queries only was the goal of the offline-Simon algorithm of Bonnetain et al. (ASIACRYPT 2019). In the final part of this talk, we will show that this algorithm allows to reach a more than quadratic speedup against some specific block cipher constructions. This is joint work with Xavier Bonnetain and Ferdinand Sibleyras.<br/> lien: https://univ-rennes1-fr.zoom.us/j/97066341266?pwd=RUthOFV5cm1uT0ZCQVh6QUcrb1drQT09
Next sessions
-
Polytopes in the Fiat-Shamir with Aborts Paradigm
Speaker : Hugo Beguinet - ENS Paris / Thales
The Fiat-Shamir with Aborts paradigm (FSwA) uses rejection sampling to remove a secret’s dependency on a given source distribution. Recent results revealed that unlike the uniform distribution in the hypercube, both the continuous Gaussian and the uniform distribution within the hypersphere minimise the rejection rate and the size of the proof of knowledge. However, in practice both these[…]-
Cryptography
-
Asymmetric primitive
-
Mode and protocol
-
-
Post-quantum Group-based Cryptography
Speaker : Delaram Kahrobaei - The City University of New York