Grover on Chosen IV Related Key Attack Against GRAIN-128a
Document Type
Conference Article
Publication Title
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics
Abstract
In this paper, we present a chosen IV related key attack on Grain-128a, that exploits Grover’s algorithm as a tool. Earlier a classical version of such a chosen IV related key attack was considered by Banik et al. in ACISP 2013. They showed that using around γ·232 related keys (where γ is an experimentally determined constant and is estimated as 28), and γ·264 chosen IVs one can mount the attack in the classical domain. This is because for each related key on an average 232 chosen IVs need to be examined. Thus, the query complexity becomes O(232·232), i.e., O(264). Contrary to this, thanks to the quantum paradigm, we use the superposition of all these 264 queries at a time and feed them to the oracle. As a result, we could manage to decrease the complexity of the related key search to the order of 216, consequently reducing the number of required IVs to 232 through the exploitation of the Grover search algorithm. Simulation of the attack against a reduced version of Grain-128a like cipher in the IBMQ simulator has also been presented as proof of the concept. Resource estimation for hardware implementation of the attack is presented and analyzed under NIST MAXDEPTH limit.
First Page
287
Last Page
306
DOI
10.1007/978-3-031-56232-7_14
Publication Date
1-1-2024
Recommended Citation
Maitra, Arpita; Samanta, Asmita; Kar, Subha; Garai, Hirendra Kumar; Mandal, Mintu; and Dey, Sabyasachi, "Grover on Chosen IV Related Key Attack Against GRAIN-128a" (2024). Conference Articles. 867.
https://digitalcommons.isical.ac.in/conf-articles/867