Flatow Algorithm
Contents
Introduction Overview of the Flatow Algorithmss
Three Diverse Algorithms Multiple Flatow Algorithms crack AES
Flatow AES Algorithm AES Specific Crack
Flatow QNN Algorithm AES Crack with Quantum Neural Net
Flatow Interference Algorithm Block Encryption Crack with Quantum Interference
All Classic Encryption Vulnerable The algorithm extents to all classic encryption
Quantum AES Threat A video demonstrating AES vulnerabilities

Flatow Algorithm Description

The Flatow Algorithms are innovative quantum-based approaches designed to expose vulnerabilities within classical encryption systems, specifically targeting AES.

Unlike classic brute-force attacks, which sequentially test each possible key, Flatow’s Algorithm leverages qubits that can exist in multiple states simultaneously, a state called superposition.

Utilizing the principles of quantum superposition and entanglement, these algorithms enable simultaneous exploration of vast key spaces—far beyond the reach of classical computing capabilities.

This allows them to perform parallelism that classical bits simply cannot achieve.

Three Diverse Algorithms

We have developed three distinctly approaches:

  1. Quantum AES Simulation (FA-AA)
  2. Quantum Neural Net (FA-QNN)
  3. Quantum Interference (FAI)

Comparison:

Algo Key Qubits Methodology Strengths
FA-AA 128-256 96-128 Amplitude Encoding Fast, direct quantum search of key space with AES decoding
FA-QNN 128-256 118-150 Quantum Neural Networks Neural Net learning-based approach for decryption simulation
FAI Universal 48-80 Quantum Interference Generalizable for all block ciphers, interference decryption discovery

All utilise quantum superposition and entanglement and run on current Quantum Computers.

Each of the three algorithms, FA-AA, FA-QNN, and FAI, demonstrates the same key result: AES is Quantum Toast. These approaches represent three distinct pathways to cracking AES encryption using quantum computing, and each provides a unique insight into how quantum systems can be used for cryptanalysis

Flatow AES Simulation (FA-AA)

FA-AA is AES-specific and uses Amplitude Amplitude Encoding (AA) to perform a quantum search for the correct AES key.

This algorithm explores the key space by leveraging quantum superposition to efficiently test all possible keys simultaneously.

Key Features:

  • Utilizes 32 AA qubits (for a 128-bit key) to explore the entire key space in parallel.
  • Uses direct quantum search to find the correct key.
  • The algorithm runs efficiently on current quantum hardware, demonstrating that AES encryption can be cracked with 96-128 qubits in a matter of seconds.
  • Key Contribution: FA-AA provides a proof of concept for cracking AES using quantum parallelism without interference.
  • It shows that quantum systems can explore the key space and find the correct key much faster than classical brute-force methods.
FA-AA Proof of Concept

Flatow QNN Algorithm (FA-QNN)

FA-QNN takes a Quantum Neural Network (QNN) approach, using Amplitude Amplitude Encoding (AA) qubits for training the network on AES decryption.

Key Features:

  • The QNN is trained on known AES ciphertexts to map keys to decrypted outputs.
  • 16, 24, or 32 AA qubits are used for key exploration, with the network learning the patterns in AES decryption.
  • The system uses backpropagation to fine-tune weights and optimize the key discovery process, ultimately finding the correct key through quantum-enhanced training.
  • Key Contribution: FA-QNN uses quantum neural networks to learn AES decryption, highlighting the power of machine learning in quantum encryption cracking.
FA-QNN Proof of Concept

Flatow Interference Algorithm (FAI)

FAI is the universal solution for cracking any block encryption, using quantum interference to identify the correct key for AES and other block ciphers.

Key Features:

  • Unlike FA-AA and FA-QNN, FAI doesn't simulate the decryption process step by step. Instead, it uses quantum interference to explore key states, filter out non-reversible keys, and stabilize the correct key.
  • FAI works on any block cipher, providing a generalizable approach to quantum decryption.
  • The system employs quantum parallelism to test all possible keys simultaneously, with constructive interference amplifying the correct key and destructive interference eliminating incorrect ones.
  • Key Contribution: FAI provides a universal solution to crack any block encryption cipher, and can crack AES with as few as 48 AA qubits, demonstrating the scalability of quantum computing for cryptanalysis.
FAI Proof of Concept

All Classic Encryption Vulnerable

While some Flatow Algorithms focus on AES quantum brute force decryption, it can be applied to all classic block encryption.

Popular Ciphers that are Quantum Vulnerable include:

  • Serpent - secure symmetric-key block cipher (key size: 128, 192 or 256 bits)
  • Twofish - secure symmetric-key block cipher (key sizes: 128, 192 or 256 bits)
  • Camellia - secure symmetric key block cipher (block size: 128 bits; key sizes: 128, 192 and 256 bits)
  • RC5 - secure symmetric-key block cipher (key size: 128 to 2040 bits; block size: 32, 64 or 128 bits; rounds: 1 ... 255), insecure with short keys (56-bit key successfully brute-forced)
  • RC6 - secure symmetric-key block cipher, similar to RC5, but more complicated (key size: 128 to 2040 bits; block size: 32, 64 or 128 bits; rounds: 1 ... 255)
  • IDEA - secure symmetric-key block cipher (key size: 128 bits)
  • CAST (CAST-128 / CAST5, CAST-256 / CAST6) - family of secure symmetric-key block ciphers (key sizes: 40 ... 256 bits)
  • ARIA - secure symmetric-key block cipher, similar to AES (key size: 128, 192 or 256 bits)
  • SM4 - secure symmetric-key block cipher, similar to AES (key size: 128 bits)
  • ChaCha20-Poly1305 - 256 bit cipher with integrated Poly1305 authenticator

The reason why all these ciphers are quantum vulnerable is that they all share these properties:

  • Limited Key Space
  • The Key acts directly on the payload
  • Key-cipher determinism
  • Brute force crackable

Brute force meaning trying every possible key. This is impractical with classic computers but is a proven capacity of quantum computers.

Quantum AES Threat Video

For the technically minded we have a video that assembles all of the components involved in AES encryption and decryption.

Importantly it maps passwords to corresponding SHA hash and bit matrix. This facilitates graphic mapping between classic bits to quantum qubits.

View the video here:

Quantum AES Threat Video


scroll to top of page