Skip to main content

Questions tagged [grovers-algorithm]

Grover's algorithm is an algorithm for quantum based computing that can halve the strength of security of a symmetric cipher, given a quantum computer with enough stable interconnected qubits to implement the attack.

0 votes
0 answers
63 views

Is sha256 quantum secure? [duplicate]

I've been reading about the security implications of quantum computing on cryptographic algorithms and came across some discussions regarding SHA-256. I understand that SHA-256 is currently considered ...
Nerses Asaturyan's user avatar
8 votes
2 answers
2k views

Is lattice encryption susceptible to Grover's algorithm?

So Grover's algorithm, also known as the quantum search algorithm, can find an entry, with a high probability, in an unstructured database. Well can't we consider the basis of a lattice problem an ...
Steve Mucci's user avatar
2 votes
1 answer
84 views

Grover's algorithm explained for children? [closed]

Can you explain the mathematical details of Grover's algorithm for children?
Flan1335's user avatar
  • 361
3 votes
1 answer
261 views

What is the post-quantum security of encryptions schemes based on transpositions?

I know that if using Grover's algorithm to break a cipher, one would need to perform (2^[key space])^0.5 queries (the square root of the number of all possible keys). A simple transposition cipher ...
alpominth's user avatar
  • 393
0 votes
1 answer
157 views

Do multiple keys mitigate Grover algorithm?

Grover, a quantum algorithm, weakens AES and ChaCha20. Is it possible to use multiple symmetric keys to encrypt a message multiple times to achieve 256-bit security for quantum computers?
Flan1335's user avatar
  • 361
1 vote
1 answer
427 views

Dividing an encrypted file is secure against classical or quantum

I'm very new to cryptography and this may sound so foolish. Often I read quantum computers will brute force keys. Let's assume this is true (does it depend on key length? or on an algorithm? I don't ...
hajalev896's user avatar
2 votes
1 answer
343 views

Grover algorithm for public key cryptography - FrodoKEM

I am wondering if one can apply Grover algorithm on a key encapsulation mechanism in order to crack the shared key. For example, FrodoKEM is a key generation protocol that, for some parameters, shares ...
C.S.'s user avatar
  • 475
0 votes
2 answers
210 views

Grover algorithm for AES in CBC mode

Hello, I was wondering whether it is theoretically possible to use Grover alrogithm to break AES in CBC mode. Assume that I have ~1000 plaintext/ciphertext pairs and key length is 128 bits. I thought ...
pajacol's user avatar
  • 15
0 votes
0 answers
151 views

Can quantum computers solve NP-Complete problems?

As far as I know, quantum computers are able to solve only some of the NP-Problems in polynomial time, using the Grovers algorithm. I read that if one manages to create a reduction of Grovers ...
namaewa's user avatar
  • 59
26 votes
7 answers
6k views

Does Terra Quantum AG break AES and Hash Algorithms?

According to this Bloomberg article: A Swiss Company Says It Found Weakness That Imperils Encryption Terra Quantum AG has a team of about 80 quantum physicists, cryptographers and mathematicians, who ...
kelalaka's user avatar
  • 49k
1 vote
1 answer
223 views

Are MAC algorithms and digital signatures secure from quantum computers? If not, why?

I understand that asymmetric encryption is fundamentally deemed useless under Shor's Algorithm, and understand that symmetric encryption is somewhat quantum-resistant as long as the key-length is ...
CyberCrusader's user avatar
2 votes
1 answer
2k views

How likely is it that AES-256 is crackable within 100 years (2120)?

When people ask for a block-cipher with a larger key space than AES-256 replies usually just state that there is no need. I see where that is coming from the future is hard to predict. The two main ...
Nic's user avatar
  • 498
0 votes
1 answer
681 views

Using SHA384 as an asymmetric cipher?

SHA384 is a hash function that can be (and is) used to verify data by checking it. Can it also be used as the background for a public-key crypto system? Here is what I mean: A 48-byte string is ...
Number File's user avatar
2 votes
2 answers
3k views

Attacking AES-128 with Grover's algorithm

How many plain text / cipher text pairs are required by Grover's algorithm when it is used to try and discover a secret AES key? I am trying to determine if having a device which limits the speed at ...
big_fish_small_pond's user avatar
1 vote
1 answer
631 views

Real world performance of (still theoretical) Grover's Algorithm

Grover's Algorithm is a quantum algorithm for searching "black box" functions and could be used to reduce the search space for things like symmetric ciphers and hashes by as much as half (quadratic ...
Adam Ierymenko's user avatar

15 30 50 per page