On 10/14/2010 02:49 PM, Samuel Neves wrote:
  On 14-10-2010 19:32, Marsh Ray wrote:
3. There are quantum computer attacks theorized which appear to cut
the exponent in half again. Thus a 256 bit hash could possibly be
collided in 264 operations on some future machine.
Is there a source for this? The only quantum approach I've heard of, the
Brassard-Høyer-Tapp algorithm, takes 2^(n/3) time (and space!).

Keep in mind this was me guessing about someone else's reasoning, but it probably still holds for 2^(n/3).

I'd inferred people might be think that way from some security claims on a specific SHA-3 candidate function:
http://cubehash.cr.yp.to/submission2/strength.pdf dated 2009-09-14.
"256-bit preimage resistance. CubeHash–256 is expected to provide preimage resistance of approximately 256 bits, but quantum computers are expected to reduce preimage resistance to approximately 128 bits."

Of course, that was about preimage resistance of a specific function, CubeHash, not collision resistance in general. In fact, that same author claims that all current quantum collision attacks are actually worse than conventional ones: http://cr.yp.to/papers.html#collisioncost

CubeHash has a simple and highly regular internal structure with no resistance to meet-in-the-middle attacks other than its large 1024 bit internal state. Previously, it had been "observed" that for functions of this general design, (and I hope I'm stating this correctly) if anyone did the work to find a second preimage of the all-zeroes message, they would be then able to generate second preimages for any message at all for O(1). As you can expect, the practical significance of this was somewhat controversial.

But now it gets interesting:

Gaëtan Leurent then proposes a 2^192 quantum preimage attack (on this nominally 512-bit hash function):
     http://eprint.iacr.org/2010/506

It employs Grover's algorithm for O(N^(1/2)) searching:
    http://en.wikipedia.org/wiki/Grover%27s_algorithm

Given that a collision cannot be harder to find than a second preimage, and a second preimage cannot be harder to find than a first preiamge, and here was a proposed 2^192 on a 512-bit output-length function, it seemed like someone might have a tiny bit of justification to not feel entirely comfortable with "only" a 256-bit hash function.

- Marsh
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to