Compact Quantum Circuit Design of PUFFIN and PRINT Lightweight Ciphers for Quantum Key Recovery Attack
Saravanan, P., Jenitha, J., Sanjana, S., & Haghparast, M. (2023). Compact Quantum Circuit Design of PUFFIN and PRINT Lightweight Ciphers for Quantum Key Recovery Attack. IEEE Access, 11, 66767-66776. https://doi.org/10.1109/access.2023.3289764
Julkaistu sarjassa
IEEE AccessPäivämäärä
2023Tekijänoikeudet
© Authors 2023
Quantum computing plays a vital role in the next generation computing platforms as researchers have achieved quantum supremacy by proving that quantum computers can outperform classical computers. These high performance computers will pose a serious threat to the security of the conventional cryptographic algorithms. The secret key of the conventional cryptographic algorithms when implemented by quantum circuits can easily be recovered with the help of Grover key search algorithm. The Grover’s algorithm requires low cost quantum implementation of cryptographic algorithms in order to mount the quantum key recovery attack successfully. Hence the low cost quantum implementation of conventional cryptographic algorithms to mount quantum key recovery attack using Grover search algorithm is an active area of research. This work proposes a novel quantum circuit implementation of two lightweight block ciphers namely PUFFIN and PRINT and for the first time in literature In-place method is used to optimize the quantum resources in these two ciphers which helps to build compact quantum circuits without extra ancilla inputs. The performance metrics considered in this work to quantify the quantum resources of the proposed circuits are number of quantum gates, quantum cost, latency and number of qubits. In addition, the quantum resources are also estimated to mount the quantum key recovery attacks on the proposed quantum circuit implementations of PUFFIN and PRINT using Grover-based key search algorithm.
...
Julkaisija
Institute of Electrical and Electronics Engineers (IEEE)ISSN Hae Julkaisufoorumista
2169-3536Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/183814227
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Qutrit representation of quantum images : new quantum ternary circuit design
Taheri Monfared, Asma; Ciriani, Valentina; Haghparast, Majid (Springer, 2024)Quantum computation is growing in significance and proving to be a powerful tool in meeting the high real-time computational demands of classical digital image processing. However, extensive research has been done on quantum ... -
A Novel and Efficient square root Computation Quantum Circuit for Floating-point Standard
Gayathri, S. S.; Kumar, R.; Haghparast, Majid; Dhanalakshmi, Samiappan (Springer, 2022)It is imperative that quantum computing devices perform floating-point arithmetic operations. This paper presents a circuit design for floating-point square root operations designed using classical Babylonian algorithm. ... -
Novel qutrit circuit design for multiplexer, De-multiplexer, and decoder
Taheri Monfared, Asma; Ciriani, Valentina; Kettunen, Lauri; Haghparast, Majid (Springer, 2023)Designing conventional circuits present many challenges, including minimizing internal power dissipation. An approach to overcoming this problem is utilizing quantum technology, which has attracted significant attention ... -
Detection of distributed denial-of-service attacks in encrypted network traffic
Hyvärinen, Mikko (2016)Tausta: Hajautetut palvelunestohyökkäykset ovat jo kaksi vuosikymmentä vanhoja. Useita strategioita on kehitetty taistelemaan niiden kasvavaa määrää vastaan vuosien varrella. Sovelluskerroksen protokollien hyökkäykset ... -
Novel lightweight and fine-grained fast access control using RNS properties in fog computing
Alizadeh, Mohammad Ali; Jafarali Jassbi, Somayyeh; Khademzadeh, Ahmad; Haghparast, Majid (Springer Science+Business Media, 2023)Fog computing provides a suitable development for real-time processing in the Internet of Things (IoT). Attribute-based encryption (ABE) is the main method to control data access in fog computing. A residue number system ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.