In this paper, we report the first quantum key-recovery attack on a symmetric block cipher design, using classical queries only, with a more than quadratic time speedup compared to the best classical attack. We study the 2XOR-Cascade construction of Ga\v{z}i and Tessaro (EUROCRYPT~2012). It is a key length extension technique which provides an n-bit block cipher with 5n/2 bits of security out of an n-bit block cipher with 2n bits of key, with a security proof in the ideal model. We show that the offline-Simon algorithm of Bonnetain et al. (ASIACRYPT~2019) can be extended to, in particular, attack this construction in quantum time \~O($2^n$), providing a 2.5 quantum speedup over the best classical attack. Regarding post-quantum security of symmetric ciphers, it is commonly assumed that doubling the key sizes is a sufficient precaution. This is because Grover's quantum search algorithm, and its derivatives, can only reach a quadratic speedup at most. Our attack shows that the structure of some symmetric constructions can be exploited to overcome this limit. In particular, the 2XOR-Cascade cannot be used to generically strengthen block ciphers against quantum adversaries, as it would offer only the same security as the block cipher itself.
翻译:在本文中,我们只使用古典查询,报告对对称区块密码设计进行第一次量子钥匙回收攻击,只使用古典查询,比古典攻击速度快超过四倍。我们研究了Ga\v{z}i和Tessaro的2XOR-Cascade 建造Ga\v{z}i和Tessaro(EROCRYPT~2012),这是一个关键长度扩展技术,它提供了n-bit区块密码的5n/2位安全比特。在正比区密码中,有2个密钥比特的密码,在理想模型中有一个安全证明。我们表明,Bonnetain等人的离线Simon算法(ASIACROYPT~2019)可以扩展至,特别是以量子时间(O(2美元)和Tessaro(2美元)攻击这一建筑,为最佳古典攻击提供2.5个量的加速度。关于对正比数密码的后安全安全安全性安全性,通常只能假设使关键尺寸翻一倍是充分的预防措施。这是因为 Grover的 Grate搜索算算, 和它的衍生工具只能用来加强我们攻击本身。