Abstract
Simon’s algorithm, an exponential speedup quantum algorithm for recovering period, has been widely applied to symmetric cryptography. At Crypto 2016, Kaplan et al. showed the effect of additional collisions on the success probability of Simon’s algorithm, which led to a better analysis of previous applications. In this paper, we provide several new results of Simon’s algorithm. Firstly, we present the composing form of additional collisions and reveal the exact relationship between additional collisions and measurement outcomes for the first time. Specifically, all probabilities of observed measurements are completely depended on the number of additional collisions. Our findings shed new light on how to estimate the success probability of Simon’s algorithm with additional collisions and point out somewhere unreasonable in the work by Kaplan et al. Finally, we give the trade-off between the success probability and the number of runs of the subroutine afresh. For a random function, 4n repetitions of subroutine will ensure the success probability exponentially close to 1.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Anand, M.V., Targhi, E.E., Tabia, G.N., Takagi, T.: Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation, Post-quantum Cryptography 2016, vol. 9606, p. 44. Springer, Cham (2016)
Boneh D., Zhandry M.: Secure signatures and chosen ciphertext security in a quantum computing world. In: Advances in Cryptology—CRYPTO 2013, vol. 8043, p. 361. Springer, Berlin (2013)
Bernstein, D.J.: Introduction to post-quantum cryptography, Post-quantum cryptography, pp. 1–14. Springer, Berlin (2009)
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26, 1484 (1997)
Takagi, T., Peyrin, T.: Advances in Cryptology—ASIACRYPT 2017. Springer, Cham (2017)
NIST: Post-Quantum Cryptography, https://csrc.nist.gov/Projects/Post-Quantum-Cryptography. (2017). Accessed 08 Jan 2019
Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, vol. 212. ACM (1996)
Boneh, D., Dagdelen, O., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. In: Advances in Cryptology—ASIACRYPT 2011, vol. 41. Springer, Cham (2017)
Boneh, D., Zhandry, M.: Quantum-secure message authentication codes. In: Advances in Cryptology—EUROCRYPT 2013, vol. 592. Springer, Berlin (2013)
Damgard I., Funder J., Nielsen J. B., Salvail L.: Superposition attacks on cryptographic protocols. In: ICITS 2013, vol. 142 (2013)
Kuwakado, H., Morii, M.: Quantum distinguisher between the 3-round Feistel cipher and the random permutation. Int. Symp. Inf. Theory Appl. 41, 2682 (2010)
Kuwakado, H., Morii, M.: Security on the quantum-type Even–Mansour cipher. In: International Symposium Information Theory and its Applications. vol. 312 (2012)
Simon, D.R.: On the power of quantum computation. SIAM J. Comput. 1474, 26 (1997)
Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Advances in Cryptology—CRYPTO 2016, vol. 207. Springer, Berlin (2016)
Alagic, G., Russell, A.: Quantum-secure symmetric-key cryptography based on hidden shifts. In: Advances in Cryptology—EUROCRYPT 2017, vol. 65. Springer, Berlin (2015)
Leander, G., May, A.: Grover meets simon—quantumly attacking the FX-construction. In: Advances in Cryptology—ASIACRYPT 2017, vol. 161. Springer, Cham (2017)
Santoli, T., Christian, S.: Using Simon’s algorithm to attack symmetric-key cryptographic primitives. Quantum Inf. Comput. 17, 65 (2017)
Dong, X., Wang, X.: Quantum key-recovery attack on Feistel structures. SCI. CHINA Inf. Sci. 61, 240 (2018)
Shi, T.R., Jin, C.H., Guan, J.: Collision attacks against AEZ-PRF for authenticated encryption AEZ. China Commun. 15, 46 (2018)
Acknowledgements
This work was supported by National Natural Science Foundation of China (Grant Nos. 61572516, 61602514, 61802437 and 61802438).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
The proof of Theorem 2
For an arbitrary f(z) that \(|{{\varOmega }_{z}}|=2m\), we classify u into \({{2}^{m}}\) categories by the orthogonal relationship with t in \({{\varOmega }_{z}}\). Denoting them as \({{u}^{j}}(0\le j\le {{2}^{m}}-1)\), we have
where \(|{{u}^{j}}|=\frac{{{2}^{n-1}}}{{{2}^{m}}}\) and \(p[u\text { is observed,}u\in {{u}^{j}}]\) is from Eq. (4). If \(t\in {{\varOmega }_{z}}\), the probability of \(u\cdot t=0\) is
where
and \(\#\{t:{{u}^{j}}\cdot t=0,t\in {{\varOmega }_{z}}\}=2\times \#\{t:{{u}^{j}}\cdot t=0,t\in \varOmega _{z}^{0}\}\).
If \(t\in {{\varPhi }_{z}}\), the probability of \(ut=0\) is
Since
When m is small,
Hence,
.
The probability distribution \({{u}_{2}}t\) when \(\left| {{\varOmega }_{z}} \right| =4\)
For \(({{u}_{2}},f({{z}_{2}}))\) that \(\varOmega _{{{z}_{2}}}^{0}=\{{{t}_{0}},{{t}_{1}}\}\). We can classify the measurement outcomes \({{u}_{2}}\) into \({{2}^{2}}\) categories by the orthogonal relationship with \(\{{{t}_{0}},{{t}_{1}}\}\). Denoting them as \(u_{2}^{j}(0\le j\le 3)\), then we have combined Tables 7 and 8, and the total probability distribution of \({{u}_{2}}t\) is shown as:
Thus,
Rights and permissions
About this article
Cite this article
Shi, TR., Jin, CH., Hu, B. et al. Complete analysis of Simon’s quantum algorithm with additional collisions. Quantum Inf Process 18, 334 (2019). https://doi.org/10.1007/s11128-019-2444-x
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-019-2444-x