z-logo
open-access-imgOpen Access
Quantum rebound attack to D-M structure based on ARIA algorithm
Author(s) -
Shanque Dou,
Ming Mao,
Yanjun Li,
Dongying Qiu
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/2078/1/012003
Subject(s) - hash function , block cipher , mdc 2 , collision attack , algorithm , permutation (music) , computer science , cryptographic hash function , sha 2 , collision resistance , quantum algorithm , quantum , theoretical computer science , cryptography , mathematics , double hashing , physics , computer security , quantum mechanics , acoustics
With the increasing application of quantum computing, quantum technology is increasingly used in the security analysis and research of multiple symmetric cryptographic algorithms such as block ciphers and hash functions. In 2020, Sasaki et al. proposed a dedicated quantum collision attack against hash functions in EUROCRYPT. Some differential trajectories with a probability of 2 −2 n /3 that cannot be used in the classical environment may be used to launch collision attacks in the quantum environment. The ARIA algorithm is a block cipher proposed by the Korean researcher Kwon et al. on ICISC 2003. The block cipher algorithm is similar to AES in structure. This article mainly analyzes the security of Davies-Meyer structure, and uses AIRA as the permutation function to construct ARIA hash function based on the DM hash model. A new AIRA differential path was found based on MILP, and 7 rounds of ARIA-DM hash function quantum rebound attacks were given.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here