Contents | |
---|---|
Introduction | Overview of the Flatow Algorithmss |
Three Diverse Algorithms | Multiple Flatow Algorithms crack AES |
Flatow AES Algorithm | AES Specific Crack |
Flatow QNN Algorithm | AES Crack with Quantum Neural Net |
Flatow Interference Algorithm | Block Encryption Crack with Quantum Interference |
All Classic Encryption Vulnerable | The algorithm extents to all classic encryption |
Quantum AES Threat | A video demonstrating AES vulnerabilities |
Flatow Algorithm Description
The Flatow Algorithms are innovative quantum-based approaches designed to expose vulnerabilities within classical encryption systems, specifically targeting AES.
Unlike classic brute-force attacks, which sequentially test each possible key, Flatow’s Algorithm leverages qubits that can exist in multiple states simultaneously, a state called superposition.
Utilizing the principles of quantum superposition and entanglement, these algorithms enable simultaneous exploration of vast key spaces—far beyond the reach of classical computing capabilities.
This allows them to perform parallelism that classical bits simply cannot achieve.
Three Diverse Algorithms
We have developed three distinctly approaches:
- Quantum AES Simulation (FA-AA)
- Quantum Neural Net (FA-QNN)
- Quantum Interference (FAI)
Comparison:
Algo | Key | Qubits | Methodology | Strengths |
---|---|---|---|---|
FA-AA | 128-256 | 96-128 | Amplitude Encoding | Fast, direct quantum search of key space with AES decoding |
FA-QNN | 128-256 | 118-150 | Quantum Neural Networks | Neural Net learning-based approach for decryption simulation |
FAI | Universal | 48-80 | Quantum Interference | Generalizable for all block ciphers, interference decryption discovery |
All utilise quantum superposition and entanglement and run on current Quantum Computers.
Each of the three algorithms, FA-AA, FA-QNN, and FAI, demonstrates the same key result: AES is Quantum Toast. These approaches represent three distinct pathways to cracking AES encryption using quantum computing, and each provides a unique insight into how quantum systems can be used for cryptanalysis
Flatow AES Simulation (FA-AA)
FA-AA is AES-specific and uses Amplitude Amplitude Encoding (AA) to perform a quantum search for the correct AES key.
This algorithm explores the key space by leveraging quantum superposition to efficiently test all possible keys simultaneously.
Key Features:
- Utilizes 32 AA qubits (for a 128-bit key) to explore the entire key space in parallel.
- Uses direct quantum search to find the correct key.
- The algorithm runs efficiently on current quantum hardware, demonstrating that AES encryption can be cracked with 96-128 qubits in a matter of seconds.
- Key Contribution: FA-AA provides a proof of concept for cracking AES using quantum parallelism without interference.
- It shows that quantum systems can explore the key space and find the correct key much faster than classical brute-force methods.
Flatow QNN Algorithm (FA-QNN)
FA-QNN takes a Quantum Neural Network (QNN) approach, using Amplitude Amplitude Encoding (AA) qubits for training the network on AES decryption.
Key Features:
- The QNN is trained on known AES ciphertexts to map keys to decrypted outputs.
- 16, 24, or 32 AA qubits are used for key exploration, with the network learning the patterns in AES decryption.
- The system uses backpropagation to fine-tune weights and optimize the key discovery process, ultimately finding the correct key through quantum-enhanced training.
- Key Contribution: FA-QNN uses quantum neural networks to learn AES decryption, highlighting the power of machine learning in quantum encryption cracking.
Flatow Interference Algorithm (FAI)
FAI is the universal solution for cracking any block encryption, using quantum interference to identify the correct key for AES and other block ciphers.
Key Features:
- Unlike FA-AA and FA-QNN, FAI doesn't simulate the decryption process step by step. Instead, it uses quantum interference to explore key states, filter out non-reversible keys, and stabilize the correct key.
- FAI works on any block cipher, providing a generalizable approach to quantum decryption.
- The system employs quantum parallelism to test all possible keys simultaneously, with constructive interference amplifying the correct key and destructive interference eliminating incorrect ones.
- Key Contribution: FAI provides a universal solution to crack any block encryption cipher, and can crack AES with as few as 48 AA qubits, demonstrating the scalability of quantum computing for cryptanalysis.
All Classic Encryption Vulnerable
While some Flatow Algorithms focus on AES quantum brute force decryption, it can be applied to all classic block encryption.
Popular Ciphers that are Quantum Vulnerable include:
-
Serpent - secure symmetric-key block cipher (key size: 128, 192 or 256 bits)
-
Twofish - secure symmetric-key block cipher (key sizes: 128, 192 or 256 bits)
-
Camellia - secure symmetric key block cipher (block size: 128 bits; key sizes: 128, 192 and 256 bits)
-
RC5 - secure symmetric-key block cipher (key size: 128 to 2040 bits; block size: 32, 64 or 128 bits; rounds: 1 ... 255), insecure with short keys (56-bit key successfully brute-forced)
-
RC6 - secure symmetric-key block cipher, similar to RC5, but more complicated (key size: 128 to 2040 bits; block size: 32, 64 or 128 bits; rounds: 1 ... 255)
-
IDEA - secure symmetric-key block cipher (key size: 128 bits)
-
CAST (CAST-128 / CAST5, CAST-256 / CAST6) - family of secure symmetric-key block ciphers (key sizes: 40 ... 256 bits)
-
ARIA - secure symmetric-key block cipher, similar to AES (key size: 128, 192 or 256 bits)
-
SM4 - secure symmetric-key block cipher, similar to AES (key size: 128 bits)
-
ChaCha20-Poly1305 - 256 bit cipher with integrated Poly1305 authenticator
The reason why all these ciphers are quantum vulnerable is that they all share these properties:
- Limited Key Space
- The Key acts directly on the payload
- Key-cipher determinism
- Brute force crackable
Brute force meaning trying every possible key. This is impractical with classic computers but is a proven capacity of quantum computers.
Quantum AES Threat Video
For the technically minded we have a video that assembles all of the components involved in AES encryption and decryption.
Importantly it maps passwords to corresponding SHA hash and bit matrix. This facilitates graphic mapping between classic bits to quantum qubits.
View the video here:
Quantum AES Threat Video