Paper 2025/501

Quantum Key-Recovery Attacks on Permutation-Based Pseudorandom Functions

Hong-Wei Sun, Heilongjiang University
Fei Gao, Beijing University of Posts and Telecommunications
Rong-Xue Xu, Heilongjiang University
Dan-Dan Li, Beijing University of Posts and Telecommunications
Zhen-Qiang Li, State Key Laboratory of Cryptology
Ke-Jia Zhang, Heilongjiang University
Abstract

Due to their simple security assessments, permutation-based pseudo-random functions (PRFs) have become widely used in cryptography. It has been shown that PRFs using a single $n$-bit permutation achieve $n/2$ bits of security, while those using two permutation calls provide $2n/3$ bits of security in the classical setting. This paper studies the security of permutation-based PRFs within the Q1 model, where attackers are restricted to classical queries and offline quantum computations. We present improved quantum-time/classical-data tradeoffs compared with the previous attacks. Specifically, under the same assumptions/hardware as Grover's exhaustive search attack, i.e. the offline Simon algorithm, we can recover keys in quantum time $\tilde{O}(2^{n/3})$, with $O(2^{n/3})$ classical queries and $O(n^2)$ qubits. Furthermore, we enhance previous superposition attacks by reducing the data complexity from exponential to polynomial, while maintaining the same time complexity. This implies that permutation-based PRFs become vulnerable when adversaries have access to quantum computing resources. It is pointed out that the above quantum attack can be used to quite a few cryptography, including PDMMAC and pEDM, as well as general instantiations like XopEM, EDMEM, EDMDEM, and others.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
symmetric cryptographypseudorandom functionquantum algorithmquantum cryptanalysisQ1 model
Contact author(s)
sunhw @ hlju edu cn
History
2025-03-20: revised
2025-03-17: received
See all versions
Short URL
https://ia.cr/2025/501
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/501,
      author = {Hong-Wei Sun and Fei Gao and Rong-Xue Xu and Dan-Dan Li and Zhen-Qiang Li and Ke-Jia Zhang},
      title = {Quantum Key-Recovery Attacks on Permutation-Based Pseudorandom Functions},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/501},
      year = {2025},
      url = {https://eprint.iacr.org/2025/501}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.