With the advancement of the quantum computing technologies, a large body of research work is dedicated to revisit the security claims for ciphers being used. An adversary with …
In this paper, we present the quantum implementation and analysis of the recently proposed block cipher, DEFAULT. This cipher consists of two components, namely DEFAULT-LAYER …
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber- security attacks. One of the key security aspects is data integrity, which can be protected by …
M Rahman, G Paul - IEEE Transactions on Quantum …, 2022 - ieeexplore.ieee.org
This article presents the cost analysis of mounting Grover's key search attack on the family of KATAN block cipher. Several designs of the reversible quantum circuit of KATAN are …
The security level of a cipher is a key parameter. While general-purpose quantum computers significantly threaten modern symmetric ciphers, other quantum approaches like quantum …
MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public standardization process to select one or more schemes that provide Authenticated …
B Bathe, R Anand, S Dutta - Quantum Information Processing, 2021 - Springer
In this work, we have analyzed ChaCha against Grover's search algorithm. We designed a reversible quantum circuit of ChaCha and then estimated the resources required to …
The development of quantum computers, which employ a different paradigm of computation, is posing a threat to the security of cryptography. Narrowing down the scope to symmetric …
R Anand, T Isobe - Quantum Information Processing, 2023 - Springer
The recent developments in the creation of large-scale, commercially feasible quantum computers puts both symmetric and asymmetric encryption at risk. As they assess the …