Bartosz Naskręcki
Elements of Cryptanalysis • Adam Mickiewicz University
Chapters 34–45
This yields 39 quadratic equations in 16 binary variables per S-box.
| RSA | Broken (factoring) |
| DH / ElGamal | Broken (DLP) |
| ECC | Broken (ECDLP) |
| AES-256 | Reduced to 128-bit (Grover) |
Mitigation: double key lengths for symmetric primitives.
| ML-KEM Level | \(n\) | BKZ \(\beta\) | Cost |
|---|---|---|---|
| ML-KEM-512 | 512 | ~406 | \(\sim 2^{118}\) |
| ML-KEM-768 | 768 | ~625 | \(\sim 2^{183}\) |
| ML-KEM-1024 | 1024 | ~856 | \(\sim 2^{250}\) |
| Standard | Type | Basis | FIPS |
|---|---|---|---|
| ML-KEM | KEM | Module-LWE | 203 |
| ML-DSA | Signature | Module-LWE | 204 |
| SLH-DSA | Signature | Hash-based | 205 |
| Ch | Topic | Key Result |
|---|---|---|
| 34 | Gröbner bases | Buchberger’s algorithm; polynomial system solving |
| 35 | Algebraic S-boxes | AES S-box: 39 quadratic equations per S-box |
| 36 | Algebraic attacks | XL, cube attacks; no break on full AES |
| 37 | Quantum foundations | Qubits, superposition, entanglement |
| 38 | Shor’s algorithm | Poly-time factoring/DLP ⇒ RSA/ECC broken |
| 39 | Grover’s algorithm | \(\sqrt{N}\) search ⇒ double symmetric key lengths |
| 40 | Lattice problems | SVP/CVP NP-hard; LLL approximation |
| 41 | LWE & ML-KEM | FIPS 203 standard; module-LWE |
| 42 | Lattice attacks | BKZ cost \(\sim 2^{0.292\beta}\) |
| 43 | McEliece | Code-based PKE; large keys but unbroken |
| 44 | NIST PQC | ML-KEM, ML-DSA, SLH-DSA standardized |
| 45 | Synthesis | 1200 years: Al-Kindi to post-quantum |