论文标题
针对理想密码的量子钥匙恢复攻击的经济模型
An Economic Model for Quantum Key-Recovery Attacks against Ideal Ciphers
论文作者
论文摘要
已经确定,量子算法比古典计算机更有效地解决了几个关键的加密问题。随着量子计算领域的进展继续,重要的是要了解它们在部署加密系统中构成的风险。在这里,我们专注于这些风险之一 - 针对理想密码的量子密钥恢复攻击。具体而言,我们试图建模一位经济动机的量子攻击者带来的风险,如果恢复秘密密钥的成本少于关键追溯攻击完成时信息的价值,他将选择对理想密码进行量子密钥恢复攻击。在我们的分析中,我们介绍了量子密码电路年的概念,以衡量量子攻击的成本。该概念可用于建模运行量子钥匙恢复攻击的总时间与进行上述攻击所需的总工作的固有权衡。我们的模型结合了加密信息的时间价值,以预测是否有任何时间/工作权衡导致攻击者的积极效用进行关键恢复攻击。我们在量子计算的各种进步预测下做出这些预测。我们使用这些预测来提出建议,以使对称密钥密码的未来使用和部署以保护这些量子密钥恢复攻击的信息。我们认为,即使对量子计算的进步进行了乐观的预测,在几乎所有用例中,在常见的密码实现中使用了128位键(如AES-128(例如AES-128)中的常见密码)提供了足够的安全性。
It has been established that quantum algorithms can solve several key cryptographic problems more efficiently than classical computers. As progress continues in the field of quantum computing it is important to understand the risks they pose to deployed cryptographic systems. Here we focus on one of these risks - quantum key-recovery attacks against ideal ciphers. Specifically, we seek to model the risk posed by an economically motivated quantum attacker who will choose to run a quantum key-recovery attack against an ideal cipher if the cost to recover the secret key is less than the value of the information at the time when the key-recovery attack is complete. In our analysis we introduce the concept of a quantum cipher circuit year to measure the cost of a quantum attack. This concept can be used to model the inherent tradeoff between the total time to run a quantum key recovery attack and the total work required to run said attack. Our model incorporates the time value of the encrypted information to predict whether any time/work tradeoff results in a key-recovery attack with positive utility for the attacker. We make these predictions under various projections of advances in quantum computing. We use these predictions to make recommendations for the future use and deployment of symmetric key ciphers to secure information against these quantum key-recovery attacks. We argue that, even with optimistic predictions for advances in quantum computing, 128 bit keys (as used in common cipher implementations like AES-128) provide adequate security against quantum attacks in almost all use cases.