Close Menu
Technology News & TrendsTechnology News & Trends

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Spies hack Wi-Fi networks in far-off land to launch attack on target next door

    December 2, 2024

    QNAP firmware update leaves NAS owners locked out of their boxes

    December 2, 2024

    Found on VirusTotal: The world’s first UEFI bootkit for Linux

    December 2, 2024
    Facebook X (Twitter) Instagram
    Technology News & TrendsTechnology News & Trends
    Facebook X (Twitter) Instagram
    SUBSCRIBE
    • Home
    • Biz & IT

      Spies hack Wi-Fi networks in far-off land to launch attack on target next door

      December 2, 2024

      QNAP firmware update leaves NAS owners locked out of their boxes

      December 2, 2024

      Found on VirusTotal: The world’s first UEFI bootkit for Linux

      December 2, 2024

      Code found online exploits LogoFAIL to install Bootkitty Linux backdoor

      December 2, 2024

      Google and Kairos sign nuclear reactor deal with aim to power AI

      December 2, 2024
    • Science

      Spies hack Wi-Fi networks in far-off land to launch attack on target next door

      December 2, 2024

      QNAP firmware update leaves NAS owners locked out of their boxes

      December 2, 2024

      Found on VirusTotal: The world’s first UEFI bootkit for Linux

      December 2, 2024

      Code found online exploits LogoFAIL to install Bootkitty Linux backdoor

      December 2, 2024

      Google and Kairos sign nuclear reactor deal with aim to power AI

      December 2, 2024
    • Technology

      “Havard”-trained spa owner injected clients with bogus Botox, prosecutors say

      November 22, 2024

      The next Starship launch may occur in less than two weeks

      November 22, 2024

      For fame or a death wish? Kids’ TikTok challenge injuries stump psychiatrists

      November 22, 2024

      Nearly three years since launch, Webb is a hit among astronomers

      November 22, 2024

      Airborne microplastics aid in cloud formation

      November 22, 2024
    • Gaming

      Bazzite is the next best thing to SteamOS while we wait on Valve

      November 20, 2024

      Halls of Torment is Diablo cranked up to 50,000 kills/hour

      November 20, 2024

      GOG’s Preservation Program is the DRM-free store refocusing on the classics

      November 20, 2024

      How Valve made Half-Life 2 and set a new standard for future games

      November 20, 2024

      Dragon Age: The Veilguard and the choices you make while saving the world

      November 20, 2024
    • Gadgets

      Apple’s first Mac mini redesign in 14 years looks like a big aluminum Apple TV

      November 20, 2024

      GitHub Copilot moves beyond OpenAI models to support Claude 3.5, Gemini

      November 20, 2024

      Microsoft finally releases generic install ISOs for the Arm version of Windows

      November 20, 2024

      I, too, installed an open source garage door opener, and I’m loving it

      November 20, 2024

      Review: Amazon’s 2024 Kindle Paperwhite makes the best e-reader a little better

      November 20, 2024
    Technology News & TrendsTechnology News & Trends
    You are at:Home » Here’s the paper no one read before declaring the demise of modern cryptography
    Featured

    Here’s the paper no one read before declaring the demise of modern cryptography

    November 20, 2024Updated:November 22, 2024No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    PRESENT, GIFT64, and RECTANGLE: All three are lightweight block ciphers designed for use in “constrained” environments, such as those in embedded systems that require more speed and fewer computational resources than is possible using AES. All three are based on an SPN structure and are proposed academic designs. The related GIFT-128 is a component of GIFT-COFB, which was a finalist for the recent NIST lightweight crypto competition but lost out to an algorithm known as Ascon.

    PRESENT, meanwhile, can be found in the ISO/IEC 29167-11:2014 and ISO/IEC 29192-2:2019, but it isn’t used widely. It’s not clear if RECTANGLE is used at all. Because all three algorithms were academic designs, they have been widely analyzed.

    Integral distinguishers: In essence, finding integral distinguishers is a type of large-scale optimization problem that, when solved, provides a powerful tool for breaking encryption schemes used in block ciphers. A 2018 paper titled Finding Integral Distinguishers with Ease reported using classical computing to find integral distinguishers for dozens of algorithms. The research included 9-round distinguishers for PRESENT, GIFT64, and RECTANGLE, the algorithms studied in the September paper.

    Mixed-integer linear programming: Typically abbreviated as MILP, mixed-integer linear programming is a mathematical modeling technique for solving complex problems. MILP allows some variables to be non-integers, a property that gives it flexibility, efficiency, and optimization over other methods.

    The experts weigh in

    The main contribution in the September paper is the process the researchers used to find integral distinguishers in up to nine rounds of the three previously mentioned algorithms. According to a roughly translated version of the paper (the correct one, not the one from May), the researchers wrote:

    Inspired by traditional cryptanalysis methods, we proposed a novel computational architecture for symmetric cryptanalysis: Quantum Annealing-Classical Mixed Cryptanalysis (QuCMC), which combines the quantum annealing algorithm with traditional mathematical methods. Utilizing this architecture, we initially applied the division property to describe the propagation rules of the linear and nonlinear layers in SPN structure symmetric cipher algorithms.

    Subsequently, the SPN structure distinguisher search problems were transformed into Mixed Integer Linear Programming (MILP) problems. These MILP models were further converted into D-Wave Constrained Quadratic Models (CQM), leveraging the quantum tunneling effect induced by quantum fluctuations to escape local minima solutions and achieve an optimal solution corresponding to the integral distinguisher for the cipher algorithms being attacked. Experiments conducted using the D-Wave Advantage quantum computer have successfully executed attacks on three representative SPN structure algorithms: PRESENT, GIFT-64, and RECTANGLE, and successfully searched integral distinguishers up to 9-round. Experimental results demonstrate that the quantum annealing algorithm surpasses traditional heuristic-based global optimization algorithms, such as simulated annealing, in its ability to escape local minima and in solution time. This marks the first practical attack on multiple full-scale SPN structure symmetric cipher algorithms using a real quantum computer.

    Additionally, this is the first instance where quantum computing attacks on multiple SPN structure symmetric cipher algorithms have achieved the performance of the traditional mathematical methods.

    The paper makes no reference to AES or RSA and never claims to break anything. Instead, it describes a way to use D-Wave-enabled quantum annealing to find the integral distinguisher. Classical attacks have had the optimized capability to find the same integral distinguishers for years. David Jao, a professor specializing in PQC at the University of Waterloo in Canada, likened the research to finding a new lock-picking technique. The end result is the same, but the method is new. He explained:

    Views: 203
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAndroid Trojan that intercepts voice calls to banks just got more stealthy
    Next Article 14 dead as Hezbollah walkie-talkies explode in second, deadlier attack

    Related Posts

    Biz & IT

    Spies hack Wi-Fi networks in far-off land to launch attack on target next door

    December 2, 2024
    Biz & IT

    QNAP firmware update leaves NAS owners locked out of their boxes

    December 2, 2024
    Biz & IT

    Found on VirusTotal: The world’s first UEFI bootkit for Linux

    December 2, 2024
    Add A Comment

    Comments are closed.

    Technical Analysis for AAPL by TradingView
    Demo
    Top Posts

    Spies hack Wi-Fi networks in far-off land to launch attack on target next door

    December 2, 2024

    QNAP firmware update leaves NAS owners locked out of their boxes

    December 2, 2024

    Found on VirusTotal: The world’s first UEFI bootkit for Linux

    December 2, 2024
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured Reviews

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured Reviews 2 Mins Read
    8.1
    Trends

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Trends 2 Mins Read
    8.9
    Featured Reviews

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Featured Reviews 6 Mins Read

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Spies hack Wi-Fi networks in far-off land to launch attack on target next door

    Tablet PC Market to Witness Exponential Growth by 2028, Sources Say

    Save $25 on Philips Wired Headphone For A Great Sounding Over-Ear Headphone

    Our Picks

    Spies hack Wi-Fi networks in far-off land to launch attack on target next door

    QNAP firmware update leaves NAS owners locked out of their boxes

    Found on VirusTotal: The world’s first UEFI bootkit for Linux

    Subscribe to Updates

    Stay updated with the latest breakthroughs in technology, innovation, and business trends from Faralogic.

    Technology News & Trends
    Facebook X (Twitter) Instagram Pinterest LinkedIn
    • User Agreement
    • Terms and Conditions
    • Disclaimer
    • About Us
    © 2025 FARALOGIC.

    Type above and press Enter to search. Press Esc to cancel.