Questions tagged [grovers-algorithm]
Grover's algorithm is an algorithm for quantum based computing that can halve the strength of security of a symmetric cipher, given a quantum computer with enough stable interconnected qubits to implement the attack.
23 questions
7 votes
1 answer
629 views
AEGIS-256 security level in a post-quantum setting?
AEGIS-256 uses a 256-bit key to produce a 128-bit authentication tag. What is its security level against Grover's algorithm? I assume Grover's algorithm quadratically reduces the keyspace so in this ...
4 votes
1 answer
176 views
How does Grover's algorithm affect the MAC birthday bound and message lengths?
Grover's algorithm is said to reduce the strength of symmetric algorithms to basically half the number of bits in the key. I.e. AES-256 will have the strength of AES-128. What I've tried to understand ...
1 vote
0 answers
85 views
Are hash functions with a security of 128 bits quantum-safe? [duplicate]
I read in the Q/A on this site: " https://crypto.stackexchange.com/questions/76738/has-aes-128-been-fully-broken" that AES-128 is resistant to PQC. This is true even when Grover's algorithm ...
0 votes
1 answer
141 views
Do quantum computers break hashcash?
Hashcash is a mechanism to prove that the sender of a message is really intending to send that message instead of just performing a denial of service attack. It makes denial of service attacks harder ...
0 votes
0 answers
72 views
Is sha256 quantum secure? [duplicate]
I've been reading about the security implications of quantum computing on cryptographic algorithms and came across some discussions regarding SHA-256. I understand that SHA-256 is currently considered ...
8 votes
2 answers
3k views
Is lattice encryption susceptible to Grover's algorithm?
So Grover's algorithm, also known as the quantum search algorithm, can find an entry, with a high probability, in an unstructured database. Well can't we consider the basis of a lattice problem an ...
2 votes
1 answer
117 views
Grover's algorithm explained for children? [closed]
Can you explain the mathematical details of Grover's algorithm for children?
3 votes
1 answer
328 views
What is the post-quantum security of encryptions schemes based on transpositions?
I know that if using Grover's algorithm to break a cipher, one would need to perform (2^[key space])^0.5 queries (the square root of the number of all possible keys). A simple transposition cipher ...
0 votes
1 answer
222 views
Do multiple keys mitigate Grover algorithm?
Grover, a quantum algorithm, weakens AES and ChaCha20. Is it possible to use multiple symmetric keys to encrypt a message multiple times to achieve 256-bit security for quantum computers?
1 vote
1 answer
505 views
Dividing an encrypted file is secure against classical or quantum
I'm very new to cryptography and this may sound so foolish. Often I read quantum computers will brute force keys. Let's assume this is true (does it depend on key length? or on an algorithm? I don't ...
2 votes
1 answer
412 views
Grover algorithm for public key cryptography - FrodoKEM
I am wondering if one can apply Grover algorithm on a key encapsulation mechanism in order to crack the shared key. For example, FrodoKEM is a key generation protocol that, for some parameters, shares ...
0 votes
2 answers
276 views
Grover algorithm for AES in CBC mode
Hello, I was wondering whether it is theoretically possible to use Grover alrogithm to break AES in CBC mode. Assume that I have ~1000 plaintext/ciphertext pairs and key length is 128 bits. I thought ...
0 votes
0 answers
176 views
Can quantum computers solve NP-Complete problems?
As far as I know, quantum computers are able to solve only some of the NP-Problems in polynomial time, using the Grovers algorithm. I read that if one manages to create a reduction of Grovers ...
26 votes
7 answers
7k views
Does Terra Quantum AG break AES and Hash Algorithms?
According to this Bloomberg article: A Swiss Company Says It Found Weakness That Imperils Encryption Terra Quantum AG has a team of about 80 quantum physicists, cryptographers and mathematicians, who ...
1 vote
1 answer
301 views
Are MAC algorithms and digital signatures secure from quantum computers? If not, why?
I understand that asymmetric encryption is fundamentally deemed useless under Shor's Algorithm, and understand that symmetric encryption is somewhat quantum-resistant as long as the key-length is ...