Grover on Chosen IV Related Key Attack Against GRAIN-128a

Document Type

Conference Article

Publication Title

Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics

Abstract

In this paper, we present a chosen IV related key attack on Grain-128a, that exploits Grover’s algorithm as a tool. Earlier a classical version of such a chosen IV related key attack was considered by Banik et al. in ACISP 2013. They showed that using around γ·232 related keys (where γ is an experimentally determined constant and is estimated as 28), and γ·264 chosen IVs one can mount the attack in the classical domain. This is because for each related key on an average 232 chosen IVs need to be examined. Thus, the query complexity becomes O(232·232), i.e., O(264). Contrary to this, thanks to the quantum paradigm, we use the superposition of all these 264 queries at a time and feed them to the oracle. As a result, we could manage to decrease the complexity of the related key search to the order of 216, consequently reducing the number of required IVs to 232 through the exploitation of the Grover search algorithm. Simulation of the attack against a reduced version of Grain-128a like cipher in the IBMQ simulator has also been presented as proof of the concept. Resource estimation for hardware implementation of the attack is presented and analyzed under NIST MAXDEPTH limit.

First Page

287

Last Page

306

DOI

10.1007/978-3-031-56232-7_14

Publication Date

1-1-2024

Share

COinS