Applying Quantum Search to a Known-Plaintext Attack on Two-Key Triple Encryption

نویسندگان

  • H. D. Phaneendra
  • C. Vidya Raj
  • M. S. Shivakumar
چکیده

The process of disguising a plaintext into ciphertext is called encryption and back into plaintext is called decryption. A cryptographic algorithm, is also called a cipher, is the mathematical function used for encryption and decryption. Many algorithms are available for this purpose. Triple DES is such an algorithm. Encryption using triple DES is possible in two different ways; they are triple DES with two keys and triple DES with three different keys. Cryptanalysis can be used to recover the plaintext of a message from the ciphertext without access to or knowing the key. Exhaustive key search remains the most practical and efficient attack on Triple DES with two keys. The principles of quantum mechanics can be used to build and analyze a quantum computer and its algorithms. Quantum searching is one such algorithm. The key search in Triple DES with two keys is possible using quantum search algorithm, which is more efficient compare to any other methods. In this paper we are presenting how quantum search can be used to crack Triple DES with two keys searching for a key.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Known Plaintext Attack on Two-Key Triple Encryption

A chosen-plaintext attack on two-key triple encryption noted by Merkle and Hellman is extended to a known-plaintext attack. The known-plaintext attack has lower memory requirements than the chosen-plaintext attack, but has a greater running time. The new attack is a significant improvement over a known-plaintext brute-force attack, but is still not seen as a serious threat to two-key triple enc...

متن کامل

A Programmable Plaintext Recognizer

Other researchers have studied the feasibility of a brute force attack on DES using several known plaintexts. In practice, known plain-text/ciphertext pairs may not be readily available, but statistical information about similar plaintexts is much more easily aquired. Accordingly , we design a statistical plaintext recognizer suitable for use in a ciphertext-only key search machine. Software si...

متن کامل

A Programmable

Other researchers have studied the feasibility of a brute force attack on DES using several known plaintexts. In practice, known plain-text/ciphertext pairs may not be readily available, but statistical information about similar plaintexts is much more easily aquired. Accordingly , we design a statistical plaintext recognizer suitable for use in a ciphertext-only key search machine. Software si...

متن کامل

Tight Security Bounds for Triple Encryption

In this paper, we revisit the long-standing open problem asking the exact provable security of triple encryption in the ideal cipher model. For a blockcipher with key length κ and block size n, triple encryption is known to be provably secure up to 2 1 2 min{κ,n} queries, while the best attack requires 2κ+min{κ, n 2 } query complexity. So there has been a gap between the upper and lower bounds ...

متن کامل

On the security of αη: response to 'some attacks on quantum-based cryptographic protocols'

Lo and Ko in [1] have developed some attacks on the cryptosystem called αη [2], claiming that these attacks undermine the security of αη for both direct encryption and key generation. In this paper, we show that their arguments fail in many different ways. In particular, the first attack in [1] requires channel loss or length of known-plaintext that is exponential in the key length and is unrea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006