信息网络安全 ›› 2024, Vol. 24 ›› Issue (8): 1210-1219.doi: 10.3969/j.issn.1671-1122.2024.08.007

• 理论研究 • 上一篇    下一篇

基于Grover量子搜索算法的MD5碰撞攻击模型

张兴兰, 李登祥()   

  1. 北京工业大学计算机学院,北京 100124
  • 收稿日期:2024-04-25 出版日期:2024-08-10 发布日期:2024-08-22
  • 通讯作者: 李登祥 lidengxiang@emails.bjut.edu.cn
  • 作者简介:张兴兰(1970—),女,山西,教授,博士,主要研究方向为密码学、量子计算、量子密钥、机器学习|李登祥(2000—),男,山东,硕士研究生,主要研究方向为量子密码和量子计算
  • 基金资助:
    国家自然科学基金(62202017)

MD5 Collision Attack Model Based on Grover’s Quantum Search Algorithm

ZHANG Xinglan, LI Dengxiang()   

  1. School of Computer Science, Beijing University of Technology, Beijing 100124, China
  • Received:2024-04-25 Online:2024-08-10 Published:2024-08-22

摘要:

量子计算天然的并行性使其在密码学领域具有巨大潜力,而在信息安全领域,Hash函数的安全性至关重要。因此,后量子密码学概念的提出使得Hash函数在后量子时代的研究价值凸显。文章提出了一种基于Grover量子搜索算法的MD5碰撞攻击模型,运用模差分分析法,通过对输入的量子叠加态进行约束搜索以找到满足碰撞条件的目标态,再根据差分构造出与之相碰撞的消息。此外,文章探讨了量子搜索算法中的迭代过程及其关键操作,设计了相应的Oracle黑盒的量子线路,并对其进行性能分析,结果表明,与经典算法相比,该模型显著降低了攻击的计算复杂度,为后量子密码时期Hash函数的研究提供了新的思路和方法,也为防御此类攻击提供了有益参考。

关键词: 量子计算, 碰撞攻击, Grover量子搜索算法, MD5算法

Abstract:

Quantum computing’s inherent parallelism underscores its immense potential in cryptography and in information security, where Hash function security stands paramount. Consequently, the emergence of post-quantum cryptography underscores the importance of Hash functions research in this new era. This paoper proposed an MD5 collision attack model based on Grover’s quantum search algorithm. This model applied modular difference analysis to constrain input quantum superposition states. The goal was to seek the target state meeting collision criteria. Upon finding it, this paper constructed a colliding message based on the identified difference. Moreover, this paper delved into the iterative procedures and pivotal operations of quantum search algorithms. This paper also crafted tailored Oracle black box quantum circuits, and assessed the performance of these circuits to evaluate their effectiveness. Findings reveal that this model drastically cuts down on computational intricacies during attacks. It presents novel perspectives and approaches for the research of Hash functions in the post-quantum cryptography era. It also provides useful reference for defending against such attacks.

Key words: quantum computing, collision attack, Grover’s quantum search algorithm, MD5 algorithm

中图分类号: