Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Quantum cryptanalysis of ultralightweight mutual authentication protocols: A Grover’s search model

  • Maham Shahzadi ,

    Contributed equally to this work with: Maham Shahzadi, Madiha Khalid, Sana Qadir, Mehdi Hussain, Umar Mujahid, Muhammad Najam-ul-Islam

    Roles Formal analysis, Methodology, Writing – original draft

    Affiliation Department of Computing, School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad, Pakistan

  • Madiha Khalid ,

    Contributed equally to this work with: Maham Shahzadi, Madiha Khalid, Sana Qadir, Mehdi Hussain, Umar Mujahid, Muhammad Najam-ul-Islam

    Roles Conceptualization, Supervision, Writing – review & editing

    madiha.khalid@seecs.edu.pk

    Affiliation Department of Computing, School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad, Pakistan

  • Sana Qadir ,

    Contributed equally to this work with: Maham Shahzadi, Madiha Khalid, Sana Qadir, Mehdi Hussain, Umar Mujahid, Muhammad Najam-ul-Islam

    Roles Validation

    Affiliation Department of Computing, School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad, Pakistan

  • Mehdi Hussain ,

    Contributed equally to this work with: Maham Shahzadi, Madiha Khalid, Sana Qadir, Mehdi Hussain, Umar Mujahid, Muhammad Najam-ul-Islam

    Roles Visualization

    Affiliation Department of Computing, School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad, Pakistan

  • Umar Mujahid ,

    Contributed equally to this work with: Maham Shahzadi, Madiha Khalid, Sana Qadir, Mehdi Hussain, Umar Mujahid, Muhammad Najam-ul-Islam

    Roles Validation, Writing – review & editing

    Affiliation Department of Information Technology, Georgia Gwinnett College, Lawrenceville, Georgia, United States of America

  • Muhammad Najam-ul-Islam

    Contributed equally to this work with: Maham Shahzadi, Madiha Khalid, Sana Qadir, Mehdi Hussain, Umar Mujahid, Muhammad Najam-ul-Islam

    Roles Supervision

    Affiliation Department of Electrical Engineering, Namal University, Mianwali, Pakistan

Abstract

Quantum computing developments hold the promise of transforming the IT security landscape. Advances in quantum processors have introduced new theoretical threats to traditional cryptographic primitives through algorithms such as Grover’s search and Shor’s factorization, which can be used to cryptanalyze symmetric and asymmetric ciphers, respectively; however, the practical realization of these attacks depends critically on the availability of Cryptographically Relevant Quantum Computers (CRQCs). While current quantum hardware is still a considerable distance from achieving this threshold, the steady progress in technology suggests that the realization of CRQCs depends fundamentally on ongoing advances in scaling and engineering. In response to this emerging long-term threat, NIST has revised traditional encryption standards by introducing post-quantum cipher suites. While post-quantum cryptography research has primarily focused on conventional asymmetric cryptosystems, symmetric ultralightweight ciphers—commonly employed in resource-constrained environments such as RFID systems—remain an underexplored target of quantum cryptanalysis. This work takes an initial step toward addressing this gap by demonstrating full disclosure attacks on three ultralightweight mutual authentication protocols: the Ultra-Lightweight RFID Authentication and Renewal Protocol (ULRARP+), the Lightweight RFID Authentication Protocol (LRAP), and the Ultra-Lightweight RFID Authentication Protocol (URAP). Based on these findings, the paper proposes a set of design principles to guide the development of quantum-resilient minimalist ciphers for the post-quantum era.

1. Introduction

The Internet of Things (IoT) represents a major advancement in the ongoing technological revolution. Its applications facilitate automation, optimized manufacturing, and intelligent supply chain management. IoT networks combine heterogeneous devices connected via the internet with an automation service portfolio that includes sensing environments, processing real-time data, and actuating state variables [1].

Device authentication is a crucial feature of IoT networks to prevent unauthorized access to user-specific data. The choice of authentication mechanism depends on two factors: on-chip resources and the nature of the access control model. In track-and-trace applications, physical objects have virtual identities through Radio Frequency Identification (RFID) tags with unique ID, and Ultralightweight Mutual Authentication Protocols (UMAPs) perform challenge/response-based authentication of tag/reader pair and ID encryption using minimalist bitwise operators [2]. UMAPs can be classified into the following categories:

  • Triangular UMAPs: This category comprises protocols that use simple bitwise operators (AND, OR, XOR) as primitives, i.e., Lightweight Mutual Authentication Protocol (LMAP) [3], Efficient Mutual Authentication Protocol (EMAP) [4], Minimalist Mutual-Authentication Protocol (M2AP) [5].
  • Non-Triangular UMAPs: Protocols use shuffle-based operations to improve the confusion and diffusion of ciphertext, keeping the hardware implementation minimal. Non-triangular operators include but are not limited to rotations and multiplication functions, which are used in protocols like Ultra-lightweight RFID Authentication Protocol (URAP) [6], Ultra-lightweight Resilient Mutual Authentication Protocol (URMAP) [7], Ultra-lightweight Dot Product-based Authentication Protocol (UDAP) [8].

Owing to the imbalanced nature of their underlying primitives, triangular UMAP protocols are rendered obsolete. Current advancements in the field are focused on designing non-triangular alternatives with more balanced and secure constructions.

The security of modern symmetric ciphers relies on the computational hardness of brute-force key-search attacks. However, with quantum computing’s algorithmic superiority over classical computers, the time complexity is theoretically expected to decrease drastically, making the protocols vulnerable to quantum attacks [9]. Therefore, measures are required to implement quantum-safe security practices before Q-Day, i.e., when quantum computers can perform tasks impossible for classical computers to solve [10]. Keeping in view the potential of Quantum Computing (QC), Michele Mosca presented a plan for systems to become quantum resilient [11]. As per the proposed model, for the system to be secure, the sum of shelf life of information and duration required to implement quantum-safe systems should be less than time before the Q-day.

1.1 Motivation

Given the transient nature of RFID-based identification information and the Q-Day approaching faster than anticipated, evaluating the quantum resilience of UMAPs is a pressing need. Since these ciphers are symmetric, their quantum resistance is assessed by checking the protocol’s response to Grover’s search model.

1.2 Contribution

A systematic literature review reveals that quantum cryptanalysis has not yet been applied to UMAP protocols. The proposed study aims to fill this unexplored area by presenting a functional model to evaluate the strength of UMAPs in the post-quantum era. Three non-triangular UMAPs, i.e., Ultra-Lightweight RFID Authentication and Renewal Protocol (ULRARP+) [12], Lightweight RFID Authentication Protocol (LRAP) [13], and Ultra-lightweight RFID Authentication Protocol (URAP) [14], have been analyzed in conjunction with Grover’s algorithm for the proof of concept. The following is the list of contributions presented in the paper:

  1. Functional analysis of selected UMAPs to model cryptanalysis as an unsorted search problem.
  2. Full disclosure attack using Grover’s algorithm to retrieve the attributes encrypted by each protocol.
  3. Insights for designing future ultra-lightweight ciphers with quantum resistance.

1.3 Organization

The paper is organized as follows: Section 2 provides a comprehensive overview of Grover’s algorithm and its application as a brute force attack model. Section 3 evaluates the quantum vulnerability of three UMAPs—ULRARP + , LRAP, and URAP—using a combination of functional and quantum cryptanalysis techniques. Section 4 discusses the results and explores their implications for designing quantum-resilient UMAPs. Finally, Section 5 summarizes the key findings and outlines directions for future research.

2. Preliminaries

This section lays the groundwork for the quantum cryptanalysis presented in this paper. It begins by detailing the core principles of Grover’s search algorithm, a cornerstone for unstructured search problems. Subsequently, a generalized description is provided of how this versatile algorithm can be adapted for brute-forcing the encrypted plaintext, particularly in the context of ultralightweight mutual authentication protocols.

2.1 Grover’s search algorithm

Grover’s search is a quantum algorithm for unsorted search problems that offers quadratic speedup over classical approaches. Its applications span optimization problems, pattern matching, cryptanalysis of block ciphers, and testing pre-images in cryptographic hash functions.

Given the current limitations in error-free quantum computation, the practical advantage of Grover’s algorithm remains unrealizable. However, with the ongoing global efforts to achieve advanced quantum computing capabilities, the potential of Grover’s algorithm—especially for brute-force cryptanalysis—remains highly significant.

Grover’s algorithm adopts a query-based approach, modeling classical problems as phase oracles that invert the amplitude of target states. The design steps for constructing a phase oracle are as follows:

  1. 1. Define the classical problem as a function with L-bit domain and 1-bit range:
  1. 2. Express the function using basic logic gates, i.e., AND, XOR, OR, and NOT.
  2. 3. Construct a quantum circuit implementing the Boolean function using quantum analogs of classical gates. Table 1 defines the quantum gate analogs [15].
thumbnail
Table 1. Mapping of Boolean logic gates to quantum gate analogues.

https://doi.org/10.1371/journal.pone.0347296.t001

  1. 4. Transform the quantum circuit into a query model:

The unitary operator Uf is designed using the reversible nature of quantum gates. The operations applied to input qubits are reversed in the oracle to restore the original input x. At the same time, the output is transferred to the ancilla qubit , which acts as the target.

  1. 5. Design the phase query gate:

The oracle Uf maps the input and ancilla to , maintaining reversibility. To transform this into a phase oracle Zf, the ancilla is initialized in the state. Through the phase kickback mechanism, the phase of the target state is flipped, resulting in

Grover’s algorithm is applied to input qubits and amplifies those inputs for which f(x) = 1. The phase oracle Zf identifies such inputs by inverting their phase. The flow of Grover’s algorithm comprises of the following steps:

  1. 1. Superposition: The algorithm begins by initializing L qubits representing input x to the state, then applying Hadamard gates to create a uniform superposition:
(1)

This superposition allows the quantum system to explore all states simultaneously.

  1. 2. Oracle: The phase oracle (Zf) defined in the subsequent discussion is connected with uniformly superposed qubits. This black-box function flags the marked state, i.e., f(x)=1, by flipping its phase
  2. 3. Amplitude Amplification: Following the oracle, the diffusion operator is applied to amplify the amplitude of the marked (i.e., correct) state. This process increases the probability of measuring the desired solution from a superposition of all possible states. The diffusion operator is mathematically defined as:
(2)

where is the uniform superposition state and I is the identity matrix.

To determine how many times the oracle and diffusion operator should be applied, we calculate the optimal number of iterations using Grover’s formula:

(3)

Here, s is the number of marked states (typically s = 1 for a single solution), and L is the number of qubits involved in the search space (i.e., those initialized into superposition and acted upon by the oracle and diffuser), so N = 2L is the total number of possible states being searched.

This equation ensures that the amplitude of the correct (marked) state is maximally amplified without overshooting. If fewer iterations are executed, the amplitude may not reach its peak, reducing the success probability. Conversely, if the algorithm is iterated beyond the optimal number of steps, the amplitude begins to decrease again due to the sinusoidal nature of amplitude evolution. Therefore, r is chosen as the integer closest to the peak of the amplification curve to maximize the probability of measuring the correct state.

  1. 4. Measurement: After the required iterations, a measurement in the computational basis will yield the marked state with high probability.

Grover’s search amplifies the measurement probability of input values x for which f(x) = 1, achieving optimal success probability in approximately queries, where N = 2n is the total number of states in the search space defined by the n qubits involved, and s is the number of marked solutions. Fig 1 presents the block diagram of Grover’s algorithm for n = 2, so N = 4 and s = 1.

thumbnail
Fig 1. Block diagram of Grover’s search algorithm.

https://doi.org/10.1371/journal.pone.0347296.g001

2.2 Quantum brute force attack

In quantum cryptanalysis of symmetric ciphers, the traditional brute-force attack is presented as a search problem with a single solution, i.e., s = 1. The description of the search function for the attack model is

(4)

Where PT and CT refer to the known Plain Text and Cipher Text pair, the oracle defines a function that flips the phase of the correct key, i.e., the Key where E(PTknown, Key) = CTknown. The value of Key is then amplified iteratively through the diffusion function before generating the required output with the highest measurement probability.

NIST quantifies the complexity of quantum cryptanalysis using the logical cost (Ctotal) [16]. Given the sequential iterations of the quantum oracle, the resource requirements for a quantum brute-force attack are determined by the expression provided in Equation 5.

(5)

The details of variables used in the expression 5 are as follows:

  • Key Size(k):The size of unique key being searched against (PTknown, CTknown) pair.
  • Width(W): The total number of qubits utilized.
  • Depth(D): The number of gate layers, representing the sequential unitary operations applied.

Through this framework, quantum vulnerability becomes inversely proportional to ; as the total cost of implementing the quantum circuit increases, the inherent resilience of the symmetric cipher against Grover-based attacks is strengthened. ‘Fig 2 presents the generalized block diagram for the quantum cryptanalysis of symmetric ciphers.

thumbnail
Fig 2. Block diagram for Grover’s search-based cryptanalysis.

https://doi.org/10.1371/journal.pone.0347296.g002

NIST characterizes the security of symmetric primitives in terms of security strength, measured in bits and reflecting resistance to brute-force attacks, including those enabled by quantum algorithms [17]. Based on this characterization, the symmetric ciphers can be broadly categorized as follows.

  1. Traditional ciphers provide security strengths of at least 128 bits through key sizes ≥128 bits and are designed for general-purpose platforms supporting complex cryptographic structures. Common examples are AES-192 and AES 256.
  2. Lightweight ciphers typically retain a 128-bit key size while reducing implementation complexity to suit constrained environments such as IoT devices. Standard ciphers include AES-128 and ASCON.
  3. Ultralightweight ciphers target severely constrained or passive devices and often employ key sizes below 128 bits, i.e., PRESENT, GIFT, and SIMON. In addition, all ultralightweight mutual-authentication ciphers designed to ensure access control for passive RFID systems fall under this category.

Table 2 presents an overview of the quantum strength of symmetric ciphers in terms of cost, i.e., C = D × W. A systematic review shows that the UMAP category remains unexplored mainly from a quantum-cryptanalysis perspective, with the existing literature predominantly focusing on classical threat models.

thumbnail
Table 2. Overview of quantum cryptanalytic cost metrics for symmetric ciphers.

https://doi.org/10.1371/journal.pone.0347296.t002

UMAPs portfolio includes tag/reader authentication and ID encryption. These services are performed using tag dynamic identities, i.e., Indexpseudonym (IDS), Key (K), and random numbers (n). These values are updated after every successful authentication session to ensure the freshness of public messages. For a confidentiality breach, such as tag cloning, the adversary must gain access to all the identifiers and static ID associated with the tag. Following is the general framework that maps quantum cryptanalysis to full disclosure attack for UMAPs:

  1. Enlist the identifiers (static or dynamic) utilized for identification and authentication by the UMAP under analysis.
  2. Analyze the protocol for differentiating the identifiers communicated between a tag/reader pair as plain text or as encrypted text. Once the list of confidential values associated with the tag is shortlisted, the following techniques are used in combination for the execution of a full disclosure attack:
    1. Utilize classical functional cryptanalysis techniques to extract identifiers concealed as ciphertext using primitives with weak confusion and diffusion capabilities.
    2. Use Grover’s search-based brute force attack to extract information encrypted using the functions that claim to be computationally infeasible to reverse.

In the subsequent section, three prominent non-triangular UMAPs along with their quantum cryptanalysis are discussed in detail.

3. Quantum cryptanalysis

Ultralightweight Mutual Authentication protocols are ISO/IEC 9798-compliant, challenge/response-based, symmetric protocols for RFID systems. These protocols utilize minimalist primitives and identifiers, i.e., tags ID and dynamic pseudonyms, i.e., IDS, Key, and random numbers as symmetric keys, for the unique identification of tags within the IoT track and trace network.

This section evaluates the confidentiality claims of three non-triangular UMAPs by assessing their robustness to quantum cryptanalysis using IBM’s Qiskit framework. Due to the practical limitations of the IBM Aer simulator to handle circuits with up to 30 qubits, the UMAPs are analyzed using reduced key sizes, while preserving the structure of their cryptographic operations. Although the implementation targets a reduced key size, the cryptanalysis methodology is designed to scale and remains applicable to full-size keys, provided sufficient quantum computational resources are available.

3.1 Ultra-lightweight RFID authentication and renewal protocol (ULRARP+)

The ULRARP+ addresses the security vulnerabilities identified in prior UMAPs, i.e., LRSAS + , LRARP, and LRARP+ [12]. The protocol claims to achieve mutual authentication and confidentiality using a combination of three lightweight primitives: bitwise XOR, circular rotation (Rot(a,b)), and Permutation (Perm(a,b)). The Rot(a,b)) refers to circular left shift of operand a by the hamming weight of b whereas Perm(a,b) shuffles a in the bit-wise fashion based on the value of b. Given and , algorithm 1 defines the mechanism of the permutation function:

Algorithm 1 Permutation Function Mechanism c = Perm(a,b)

plsb = 0

p = L − 1

for do

if b[p] = 1 then

  c[pmsb] = a[p]

  

else

  c[plsb] = a[p]

  

end if

p = p − 1

end for

return c

ULRARP+ identifies the tag using static ID and dynamic pseudonyms, i.e., IDS and Key K. Table 3 presents the memory architecture of the protocol. The following steps outline the protocol’s operation.

thumbnail
Table 3. Memory architecture for ULRARP+ protocol.

https://doi.org/10.1371/journal.pone.0347296.t003

  1. 1. The reader generates a random number m and sends it to the tag.
  2. 2. The tag generates another random number n and computes authentication parameters:
(6)(7)

The tag then transmits to the reader.

  1. 3. The reader retrieves tags’ identifiers from the database to compute local values of ATH for tag authentication. In the event of successful verification, the reader generates a challenge message P2 for the reader authentication.
(8)
  1. 4. The tag verifies the reader by generating the response for message P2. After successful authentication, the dynamic variable phase initiates.
  2. 5. The tag and reader update their values using:
(9)(10)

If authentication fails, no updates occur.

Fig 3 shows the block diagram of ULRARP + .

thumbnail
Fig 3. Ultra-lightweight RFID Authentication and Renewal Protocol (ULRARP+) flow.

https://doi.org/10.1371/journal.pone.0347296.g003

3.1.1 Cryptanalysis of ULRARP+.

The quantum full-disclosure attack aims to retrieve the values associated with the RFID tags, i.e., ID, IDS, K, n, and m, which can be further exploited for tag cloning. Protocol analysis reveals that three out of five identifiers, namely n, m, and IDS, are transmitted between the tag and reader as plain text. These values, when eavesdropped during an active authentication session, serve as an anchor for the full disclosure attack.

The proposed model constitutes an active attack that involves eavesdropping on data from two valid authentication sessions and blocking the challenge messages during the second session. This approach exposes the tag’s most recent memory state, i.e., IDS2, K2, n2, m2, ID. Replicating these values onto a blank tag results in a successful tag cloning attack. Following is the step-by-step elaboration of the proposed attack:

  1. 1. Record public messages of an authentication session 1. These messages include m1, n1, IDS1, ATH1, .
  2. 2. In the subsequent session, record public messages, i.e., m2, n2, IDS2, ATH2, and block the challenge messages from the reader (n2, IDS2, ATH2) to halt the session.

This step increases the database for cryptanalysis without updating the tag’s dynamic memory, i.e., the tag’s latest pseudonyms remain IDS2 and K2.

  1. 3. Functional cryptanalysis extracts the value of K1 by exploiting the reversible nature of equation 11. The details for the calculation of the Key value are as follows:
(11)(12)

Given that all the variables on the right-hand side of equation 12 are known, K1 can be calculated deterministically in a single iteration.

  1. 4. The value of K2 is calculated using equation 13 with all the variables known at the right-hand side.
(13)
  1. 5. To recover the secret identifier ID, Grover’s algorithm is applied to the IDS update function shown in equation 14:
(14)

This equation is modeled as a key search problem, where , CT = IDS2, and . The search is then framed using the oracle function defined as equation 15:

(15)

The Boolean function is implemented using quantum logic gates, where the XOR operation is mapped to a CNOT gate, and the permutation function is realized through a sequence of SWAP gates. The oracle is constructed to induce a phase flip on the Key qubits via phase kickback for those inputs satisfying f(Key) = 1. The complete quantum circuit implementing this oracle is illustrated in Fig 4.

thumbnail
Fig 4. Quantum oracle for the ULRARP+ protocol.

https://doi.org/10.1371/journal.pone.0347296.g004

Grover’s search procedure begins by encoding the known plaintext–ciphertext pair (PT, CT), followed by the application of Hadamard gates to the Key qubits to generate a uniform superposition across all possible key values. The oracle is then applied, followed by the Grover diffusion operator.

The Grover-based quantum search operates over a 13-qubit space to amplify the probability of a marked state. The oracle and diffusion operations are applied iteratively to increase the likelihood of measuring the correct solution. After these iterations, the qubits are measured. The measurement results—presented in Fig 5—reveal the most probable value of the Key, which is then used to compute the identifier via .

The correctness of this quantum-classical cryptanalysis workflow is validated through the protocol structure and state transitions summarized in S1 Appendix.

3.2 Lightweight RFID authentication protocol (LRAP)

The Lightweight RFID Authentication Protocol (LRAP) is designed to secure access of RFID-based healthcare devices to the IoT network [13]. The protocol primitives include XOR, circular rotation (Rot(a,b)) and Crossover function (Cro(x,y)). The crossover function takes two L-bit inputs to generate a 2L-bit output. Given that the msb resides at the highest indexed bit position, i.e., (L − 1), algorithm 2 defines the pseudocode for (Cro(x,y)).

Algorithm 2 Crossover Function: c = Cro(x, y)

Require: Bitstrings x, y of equal length L

Ensure: Bitstring c of length 2n

▷ (Concatenate and y)

▷ (Concatenate and x)

Initialize c as an empty bitstring of length 2n

for to 2n − 1 do

if then

   ▷ (Even-indexed bit)

else

   ▷ (Odd-indexed bit)

end if

end for

return c

LRAP has three communicating parties, i.e., the tag, the reader, and the server. The tag assigns a virtual identity to physical objects; the reader acts as a gateway to connect the tag to the network, and the server stores the verification details of all tags associated with the system. All the entities participate in an authentication session using a set of dynamic and static identifiers. Table 4 defines the memory architecture of LRAP.

Given an L bit identification system, the bit length of the server’s index value and K is 2n bits owing to the property of the cross function to double the bit length of the output. However, the value of K is truncated to L bits after the update. This step is essential because skipping this step will exponentially increase the Key length with an increasing number of authentication sessions. Additionally, the index value and the public messages involving cross-function are also of size 2n, due to the preservation of bit length. The authentication follows a stepwise challenge-response mechanism as follows:

  1. 1. The reader generates a random number NR to initializes the query message for the tag.
  2. 2. The tag receives NR and sets the variable Mark to 00, indicating a new session. It then computes:
(16)

The tag sends P1 along with a newly generated random number NT to the reader, which forwards to the server.

  1. 3. The server receives the message and searches for the index entry that matches P1 to retrieve the tag database. If a match exists, the server generates a new random number NS and computes:
(17)(18)(19)

The server then sends to the reader.

  1. 4. The reader extracts TID from P3a, NS from P3b and verifies server through message P2. After successful server authentication, the reader sends to the tag.
(20)
  1. 5. The tag verifies the reader by generating a local copy of P4. Successful reader authentication results in an updated value of K and the generation of a tag authentication phalange message P5 for the reader.
(21)(22)
  1. 6. The reader validates the tag by generating a local response for P5. Successful tag verification results in an updated K at the reader and server side through equation 21. Finally, the reader sends message P6 to the tag, initializing the announcement of the session’s successful completion. Verification of P6 at the tag’s side updates variable Mark to 01, identifying the pending status of server dynamic memory.
(23)
  1. 7. Next, the tag sends to the server through reader. The server then updates the index value and associated data, i.e., K.
  2. 8. Confirmation of update traverses through the reader and updates Mark to 10 at the tag’s side.

Fig 6 illustrates the flow of the LRAP.

thumbnail
Fig 6. Lightweight RFID Authentication Protocol(LRAP) flow.

https://doi.org/10.1371/journal.pone.0347296.g006

3.2.1 Cryptanalysis of LRAP.

The proposed confidentiality breach requires calculating all the variables, i.e., RID, TID, K, Knew, NS, NR, and NT, associated with the authentication session. All the random numbers (NS, NR, NT) are transmitted as plain text, which reduces the problem to estimating RID, TID, K, and Knew.

The proposed attack is passive; therefore, it requires eavesdropping on all public messages from a single session among the tag, reader, and server, followed by exploitation of the reversible nature of the XOR function and execution of Grover’s algorithm-based brute-force attack.

  1. 1. Message P4 and P6 is used for the deterministic calculation of TID and Knew respectively.
(24)(25)

calculation of RID and K requires quantum cryptanalysis.

  1. 2. For RID, the target equation is presented as equation 26:
(26)

The quantum circuit initialization begins with assigning the known values as follows: PT = {Knew}, CT = {P5}, and . The phase oracle for identifying the correct reader identifier RID is defined by Equation 27:

(27)(28)

The Boolean function is implemented using a combination of CNOT gates to realize the crossover function Cro(x, y). The quantum states involved in evaluating f(x) are initialized using Hadamard gates, enabling superposition over all possible inputs and facilitating the discovery of unknowns. The complete oracle circuit corresponding to Equation 28 is shown in Fig 7.

The oracle, once constructed, is integrated with the Grover diffusion operator to amplify the amplitude of the correct solution. This oracle-diffusion process is applied iteratively to enhance the probability of observing the desired result. After these iterations, measurement is performed, and the most probable Key is extracted from the results, as shown in Fig 8.

thumbnail
Fig 8. Measured output of Cro(x, y) oracle to evaluate in LRAP.

https://doi.org/10.1371/journal.pone.0347296.g008

The final step involves computing the original reader identifier using the retrieved key, as shown in Equation 29:

(29)
  1. 3. To estimate the unknown key K, the following values are defined: PT = {TID ⊕ RID}, CT = {P1}, and Key = {K}. The phase oracle employed to identify the correct key is characterized by Equation 30:
(30)(31)

The Boolean function f(x) is implemented using a quantum oracle that encodes the crossover function Cro(x, y). To enable the discovery of unknowns, the inputs are initialized using Hadamard gates, placing the system into a superposition over all possible key states. This allows quantum interference to guide the search toward the correct solution. The corresponding oracle circuit is shown in Fig 7.

Grover’s algorithm proceeds by applying the oracle to mark the solution state—where f(K) = 1 —through a conditional phase inversion. This is followed by the diffusion operator, which amplifies the probability amplitude of the correct key. These steps are repeated iteratively to increase the likelihood of observing the desired result upon measurement.

Once the iterative amplification process is complete, the quantum circuit is measured, and the most probable key candidate is extracted, as illustrated in Fig 9.

thumbnail
Fig 9. Measured output of Cro(x, y) oracle to evaluate f(K) in LRAP.

https://doi.org/10.1371/journal.pone.0347296.g009

The effectiveness of this quantum-classical cryptanalysis process is corroborated by the protocol cryptanalysis summary S2 Appendix.

3.3 Ultra-lightweight RFID authentication protocol (URAP)

The Ultra-lightweight RFID Authentication Protocol (URAP) facilitates secure communication among the reader, tag, and server using minimalist cryptographic operations  [14]. It is proposed as a secure alternative to LRAP, utilizing the same set of primitives: bitwise XOR, circular rotation Rot(a,b), and the crossover function Cro(x,y). Table 5 summarizes the memory architecture of the protocol.

The protocol operates through the following eleven steps:

  1. 1. The reader generates a random number RR and encrypts it using the pre-shared key KRT:
(32)

It sends a message to the tag over a public channel.

  1. 2. The tag extracst RR from M1, generates a random number RT, sets the Mark to 00, and computes:
(33)(34)

The tag sends M2 and to the reader.

  1. 3. The reader decrypts RT from and encrypts both nonce using KSR:
(35)

and computes:

(36)

Moreover, it sends it to the server.

  1. 4. The server extracts RR, RT, identifies tag through M3, generates RS and computes:
(37)(38)

It sends M4 to the reader.

  1. 5. The reader extracts RS, verifies server and send to the tag. The equations of these public messages are as follows:
(39)(40)
  1. 6. The tag computes:
(41)(42)

It then sends:

(43)

to the reader.

  1. 7. The reader computes Knew using equation 42, after verifying message M6. It then sends M7 to the server.
(44)
  1. 8. The server verifies the reader, updates K and sends message M8 to the tag via reader:
(45)
  1. 9. The tag retrieves Knew, if verified, it sets mark = 01, indicating synchronization.
  2. 10. The tag notifies the reader and the server to update the record through M9:
(46)
  1. 11. The server receives mark = 01 and updates the index table with:

The tag sets mark = 10 after confirmation.

A block diagram of the protocol is presented in Fig 10.

thumbnail
Fig 10. Ultra-lightweight RFID Authentication Protocol (URAP) flow.

https://doi.org/10.1371/journal.pone.0347296.g010

3.3.1 Cryptanalysis of URAP.

For tag cloning, the adversary needs to retrieve all the variables associated with the tag. The set of tag authentication session identifiers is given in equation 47.

(47)

The conjecture of the above-elaborated values requires a combination of classical functional and quantum cryptanalysis. The nature of the attack is passive, as the adversary only needs to eavesdrop on a single session. The details of the full disclosure attack are as follows:

  1. 1. Calculate by taking XOR of public messages 32 and 33.
(48)

The value of Knew is retrieved using the expression 49.

(49)
  1. 2. RS is retrieved using public message M9. Since the value of Mark = 01 after key update at the tag’s side, the random number is calculated as:
(50)

Equation 50 is valid for full-scale URAP cryptanalysis. In that case, the variable Mark will be extended by appending zeros at the most significant end of the variable to ensure output conformity.

  1. 3. KRT is calculated from equation 39.
(51)
  1. 4. The random numbers associated with the tag and the reader are calculated as follows:
(52)
  1. 5. TID is retrieved from the equation 40.
(53)
  1. 6. KSR is calculated using equation:
(54)
  1. 7. Calculate using the estimated values of random numbers:
(55)

The value is used with equation 42 to retrieve the value of K.

(56)

The Grover oracle of this equation becomes:

(57)

where, , CT = Knew, and Key = K. This relationship can be generalized as shown in Equation 31, whose corresponding quantum oracle is illustrated in Fig 7. The measurement outcomes for the numerical cryptanalysis example applied to URAP are presented in Fig 11.

thumbnail
Fig 11. Measured output of Cro(x, y) oracle to evaluate f(K) in URAP.

https://doi.org/10.1371/journal.pone.0347296.g011

  1. 8. Finally, the value of RID is estimated through equation 34.
(58)

For the given equation, PT = K, CT = M2 and . The output of the circuit is then processed for the value of RID, i.e., . The given equation is equivalent to equation 28, hence its oracle is defined in Fig 7 and the measurement results for the test example are given in Fig 12.

thumbnail
Fig 12. Measured output of Cro(x, y) oracle to evaluate in URAP.

https://doi.org/10.1371/journal.pone.0347296.g012

The experimental results presented in this S3 Appendix proved that the simplified versions of selected URAP is vulnerable to quantum cryptanalysis.

The subsequent section demonstrates that the proposed framework is feasible for full-scale UMAPs, provided that adequate quantum resources are available.

4. Discussion

This section presents a discussion on the quantum cryptanalysis of UMAPs proposed in the preceding section, as well as the design principles for a quantum-resilient UMAP. The details of these insights are as follows:

4.1 Assessment of confidentiality threats on UMAPS

The quantum cryptanalysis framework for UMAPs presented in Section 2.2 consists of functional cryptanalysis followed by Grover’s search. As Grover’s algorithm requires a known plaintext–ciphertext (PT, CT) pair, any equation subjected to quantum attack must be structured such that a single variable remains unknown, i.e., treated as the key. At the same time, all other parameters are initialized with known plaintext or ciphertext values.

The non-triangle UMAPs discussed in the paper, i.e., ULRARP + , LRAP, and URAP, exhibit information leakage through their public messages, which ultimately leads to a full disclosure attack. The following are the key weaknesses due to which the protocol becomes vulnerable to functional cryptanalysis:

  1. In ULRARP + , three out of five tag identifiers are communicated as plaintext, which facilitates the estimation of K and ID.
  2. In LRAP, the random nonce generated and transmitted by each entity is further exploited to complete the confidentiality breach.
  3. In the case of URAP, none of the identifiers is communicated as plaintext, making the cryptanalysis elaborate. However, the predictable value of Mark in equation 46 acts as a domino effect in breaking the protocol.

Another design weakness observed in LRAP and URAP was in the key K update function that used a cross primitive. Due to the primitive’s property of doubling the output to the input, the bit length of the key is theoretically expected to increase exponentially, i.e., from 8 to 16, 32, and beyond—leading to a rapid escalation in memory demands. This growth affects not only temporary storage (buffers) but also fixed hardware parameters such as register widths and memory allocation units. In practical deployments involving RFID tags or embedded devices, where strict limits on memory and computation exist, such unbounded growth may result in exhaustion of system resources. Absent a well-defined mechanism to bound or compress the key size, the protocol becomes increasingly untenable for long-term use, ultimately risking operational failures due to memory overflows or degraded performance. Alternatively. truncation of the updated key increases the likelihood of false positives in identification since multiple tags will have similar key values.

The aforementioned weaknesses are leveraged to model the attack as a search problem. The vulnerable primitives of ULRARP + , LRAP, and URAP are permutation (P er(a, b)) and cross (Cro(a, b)) functions, respectively. In the permutation function, a is shuffled as per the bit value of b. This requires measuring the corresponding qubits that represent b. Since measurement is an irreversible function, Grover’s search is not feasible in a permutation function when the unknown key assumes the operand b position. Fig 4 presents the oracle for the permutation function that can effectively retrieve the key only when Key assumes the position of operand a. The key qubits are initialized using Hadamard gates to enable search over all possible values. Since the crossover function performs index-based shuffling, the correct key can be retrieved regardless of the input configuration. The oracle implementing this function is shown in Fig 7.

Due to the current limitations in quantum simulators, this study focuses on demonstrating full disclosure attacks on 4-bit reduced versions of selected UMAPs. Despite the reduced scope, the implementation captures the complete theoretical framework for scaling the attack to full-size versions under more capable quantum platforms.

For all UMAP implementations presented in this work, the Grover’s search algorithm operates with n = 4 qubits and assuming a single valid solution (s = 1). Based on the optimal iteration formula provided in Equation 3, the number of Grover iterations required for each Grover search is 3. A comprehensive resource summary of the Grover circuits corresponding to the implemented search equations is provided in Table 6.

thumbnail
Table 6. Oracle metrics for key search functions using Grover’s algorithm.

https://doi.org/10.1371/journal.pone.0347296.t006

The oracle constructions of the analyzed UMAPs can, in principle, be scaled to enable Grover’s search–based recovery of 128-bit keys, given the availability of large, fault-tolerant quantum computers. For quantitative context, the quantum resources required to implement the higher-order oracles defined in Equations 15 and 28 are summarized in Table 7.

thumbnail
Table 7. Scaled oracle metrics for key search functions using Grover’s algorithm.

https://doi.org/10.1371/journal.pone.0347296.t007

Since the non-triangular primitives operate at the bit level, increasing the tag’s identifier bit length—i.e., the Grover’s search Key size—inevitably leads to greater circuit depth and width. For a Key of L bits, the quantum circuit must perform a bitwise comparison between the known ciphertext CTknown and the calculated ciphertext E(Key, PTknown). This comparison is implemented using n CNOT gates followed by Pauli-X gates to emulate the effect of bitwise XNOR.

To mark the correct key state within Grover’s algorithm, the output of the XNOR operation must indicate a complete bitwise match—that is, all output bits must be 1. This condition is verified by computing the logical AND of all comparison bits, typically implemented using a cascade of Toffoli gates and ancillary qubits. If the comparison evaluates to true (i.e., all bits match), the oracle applies a phase inversion to the corresponding key state.

The subsequent application of the Grover diffusion operator amplifies the amplitude of this marked key state, increasing its probability upon measurement. This linear increase in circuit complexity with respect to key size highlights the growing resource demands of Grover’s search and reinforces the necessity of using larger symmetric keys to maintain post-quantum security. Building on the insights gained from the proposed cryptanalysis, the following section outlines key design principles for UMAPs in the post-quantum era.

4.2 Toward quantum-resilient design of future UMAPs

The IoT sensing layer is crucial since it collects user-specific data in real-time. Despite its transient nature, such data often drives immediate decisions, whether in access control, supply chain logistics, or health monitoring, making it a high-value target for adversaries. Therefore, lightweight yet robust security mechanisms are essential to ensure confidentiality, authenticity, and integrity without compromising system responsiveness. Since 2006, more than 1000 UMAPs have been proposed, but the optimal balance between security and minimalism remains a challenge. Now, with the standardization of post-quantum ciphers, the challenge has evolved into a new dimension of quantum resilience.

Since UMAPs are symmetric-key protocols, their quantum robustness is determined by resistance to Grover’s search-based key-recovery attacks under known (PT,CT) pairs. This robustness can be quantified in terms of NIST-specified logical cost, as defined in Equation 5. Accordingly, achieving quantum resilience in UMAPs requires increasing the logical cost associated with Grover’s search-based attacks, as outlined below.

  • Availability of a (PT,CT) pair is a necessary condition for a quantum cryptanalysis since the search attacks are based on the database of these pairs.
    In UMAP, challenge-response-based authentication occurs, resulting in a series of public messages per session. A larger number of public messages per session increases the exposure of the tag’s attributes, thus making the protocol vulnerable to brute-force attacks. Therefore, according to the ISO 9798 standard, for an L-bit tag identifier, a set of three L-bit public messages is sufficient for mutual authentication. These messages are used for reader authentication, tag authentication, and the transmission of the tag’s ID.
  • The primitives of a cipher play an important role in defining the confusion and diffusion capabilities of public messages. Weak primitives lead to information leakage, which in turn facilitates functional analysis. This functional analysis can then be further accelerated using Grover’s search algorithm, which complements the process by significantly reducing the time complexity of key recovery. Therefore, identifying primitives that resist Grover’s search is essential. Such quantum-resilient primitives may incorporate operations that are not efficiently realizable as reversible unitary circuits, or oracle constructions whose required circuit depth exceeds practical quantum limits. In particular, a lower bound on the order of 240 quantum gates has been suggested as a meaningful threshold, as it approximately corresponds to the number of serial quantum gate operations that near-term quantum computing architectures could be expected to execute over the course of one year [16]. Table 8 presents a comprehensive summary of the ciphers used in prominent UMAPs, along with their responses to quantum brute force attacks.
thumbnail
Table 8. Assessment of ultralightweight primitives under quantum attacks.

https://doi.org/10.1371/journal.pone.0347296.t008

Quantum cryptanalysis of bit-wise AND and OR does not yield a deterministic measurement peak due to the imbalanced nature of these functions. Therefore, for the triangular functions, multiple pairs of (PT, CT) pairs are required for the successful estimation of identifiers. The use of Grover’s search for bit-wise XOR is an overkill of resources due to its simplistic nature. The conventional computation of is far more resource-efficient. The shuffle-based functions, i.e., , can only retrieve the key value when Key = a and PT = b, not the over way round because the hamming weight function requires measurement of qubits and that is an irreversible process, making the design of the oracle infeasible. Primitives that do not involve the calculation of the hamming weight of operands, i.e., Cro(a,b) and Mixbit(a,b), can extract the information in any setting of the operand as key, making these protocols vulnerable to Grover’s search attacks. Analysis of ultralightweight primitives shows that the Conversion function (Con(a,b)) used in SLAP is resilient to quantum cryptanalysis since it shuffles both operands based on their Hamming weight.

  • An increase in the bit length of the tag’s identifiers will inherently increase the size of the quantum circuit of the phase oracle, making the search algorithm quantum resource-intensive.

This principle builds on a foundational approach to quantum resilience by increasing the key size, thereby increasing the number of Grover iterations and the required circuit width, thereby improving resistance to quantum-enabled key-search attacks [27,28].

Therefore, in the post-quantum era, the UMAP protocol should use minimal public messages, primitives that involve Hamming weights of operands, and longer tag identifiers. The subsequent section presents a case study on quantum-safe UMAPs in light of the aforementioned principles.

4.3 A quantum-safe UMAP case study

Quantum computing speeds up the brute force technique. Any UMAP that offers resistance to classical brute force attack inherently follows the principles defined in the preceding section and are quantum resilient.

One such example is Succinct and Lightweight Authentication Protocol (SLAP), an ultra-lightweight mutual authentication scheme designed for low-cost passive RFID systems [26]. The protocol relies exclusively on simple bitwise operations, namely bitwise XOR, circular left rotation (Rot(a,b)), and a lightweight conversion function (Con(a,b)), making it feasible for deployment on tags with limited computational resources. The pseudocode of the conversion function is given as Algorithm 3 and elaborated in [26].

Algorithm 3 Conversion Function: c = Con(a, b)

Require: Bitstrings a, b of equal length L, threshold T

Ensure: Bitstring c of length L

Phase 1: Recursively divide a and b based on their Hamming weights until substrings are < T

Phase 2: Rearrangement

▷(Regroup a using b’s structure)

▷ (Regroup b using a’s structure)

for each block aj in do

  

  

end for

for each block bk in do

  

  

end for

Phase 3: Composition

▷ (Bitwise XOR operation)

return c

The protocol employs a static identifier ID, a dynamic pseudonym IDS, and two secret keys K1 and K2 shared between the tag and the backend server (accessed via the reader). All parameters are L-bit strings. Table 9 summarizes the memory requirements of the protocol.

thumbnail
Table 9. Memory architecture for SLAP protocol.

https://doi.org/10.1371/journal.pone.0347296.t009

The operation of SLAP proceeds as follows:

  1. 1. The reader initiates the authentication session by sending a query message to the tag.
  2. 2. The tag responds with its current pseudonym IDS. If no response is received in a previous session, the tag retransmits the old pseudonym.
  3. 3. Upon receiving IDS, the reader searches its database for a matching entry. If a match is found, the reader generates a random nonce n and computes authentication messages A and B using equations 59 and 60.
(59)(60)

The reader sends message to the reader. Left half (BL) or right half (BR) of string B will be transmitted to the tag depending on the Hamming weight of B (if wt(B) is odd sent BL, otherwise sent BR).

  1. 4. The tag extracts the nonce n using its stored secrets and locally recomputes the authentication value () to verify the legitimacy of the reader. If verification succeeds, the reader is authenticated and the dynamic variables are updated at the tag’s side using equations 6163.
(61)(62)(63)
  1. 5. The tag then generates a response message C for it’s authentication.
(64)

Public message sent to the reader is based on the hamming weight of C.

  1. 6. Finally, reader on successful tag authentication updates the dynamic memory using equations 6163.

Fig 13 illustrates the flow of the protocol.

4.3.1 Evaluation of SLAP on quantum security matrix.

The literature review shows that SLAP ensures confidentiality and is robust to classical full-disclosure attacks. Since Grover’s search speedsup such attacks, SLAP inherently becomes resistant to quantum attacks as well. The one-on-one mapping between the protocol and proposed design principles is presented to establish formal quantum resilience of the cipher:

  1. Limited Public Messages: The design principle states that for the L-bit tag ID, the ideal size of public messages should be 3L bits.This makes the retrieval of (PT,CT) infeasible.
    For SLAP, the public mesages are IDS, A, and . Since the primitives used in the protocol give L-bit outputs, all the public messages are of the same length. Considering half of B and C are communicated for entity authentication along with A and IDS, the total size of bits communicated becomes 3L. Minimal public information makes the extraction of equation f(PT, K)=CT feasible, thus making the cipher resilient to Grover’s search.
  2. Irreversible Primitives: The protocol uses the Con(a,b) function for the calculation of all the public messages and dynamic identifiers. Algorithm 3 shows that the execution of this function requires Hamming-weight calculations for a and b and multiple stages. Since the hamming weight is translated as a measurement function in the quantum domain and owing to the irreversible nature of this operator, the construction of the phase oracle of Con(a,b) becomes infeasible. Since the phase oracle is a necessary condition for Grover’s search, SLAP cannot be subjected to this algorithm.
  3. Larger Key Sizes: The NIST specified quantum security matrices for symmetric ciphers state that a key size of 128 is adequate for quantum resilience [16], and SLAP is designed as per EPC standards that state the size of identifier to be 128-bit [29].

Given the attributes of SLAP discussed above, the protocol can be considered a concrete case study to analyse the quantum resilience of UMAPs.

5. Conclusion

In the race for quantum supremacy, nations and corporations are competing for a technological edge, one that threatens the integrity of global digital security infrastructure. Due to this threat, evaluating the quantum resilience of existing ciphers and adopting quantum-safe standards is critical. This study focuses on demonstrating full disclosure attacks on 4-bit reduced versions of selected UMAPs. Despite the reduced scope, the implementation captures the complete theoretical framework for scaling the attack to full-size versions under more capable quantum platforms. Based on insights from cryptanalysis, the study proposes initial design principles for quantum-resilient UMAPs, i.e., minimizing public message exposure, incorporating Hamming weight-based primitives, and increasing tag identifier lengths. These recommendations lay the groundwork for future post-quantum authentication protocols and provide a foundation for further advancements in ultralightweight quantum-secure cryptographic design.

Supporting information

S1 Appendix. Session-based attribute exchange and cryptanalysis in ULRARP+.

https://doi.org/10.1371/journal.pone.0347296.s001

(EPS)

S2 Appendix. Session-based execution and cryptanalysis for LRAP protocol.

https://doi.org/10.1371/journal.pone.0347296.s002

(EPS)

S3 Appendix. Session-based exchange and cryptanalysis for URAP protocol.

https://doi.org/10.1371/journal.pone.0347296.s003

(EPS)

References

  1. 1. Sasi T, Lashkari AH, Lu R, Xiong P, Iqbal S. A comprehensive survey on IoT attacks: taxonomy, detection mechanisms and challenges. J Inf Intell. 2024;2(6):455–513.
  2. 2. Morshed M, Yu H, Atkins AS. A secure lightweight authentication scheme for RFID systems in IoT environment. JOMCOM. 2025;5(1):7–15.
  3. 3. Peris-Lopez P, Hernandez-Castro JC, Estévez-Tapiador JM, Ribagorda A. LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. Proc. of 2nd Workshop on RFID Security, vol. 6; 2006.
  4. 4. Li G-R, Wang Y, Wang C-R, He J-S. EMAP: An efficient mutual authentication protocol for passive RFID tags. Int J Autom Comput. 2012;9(1):108–12.
  5. 5. Peris-Lopez P, Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda A. M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags. In: Ma J, Jin H, Yang LT, Tsai JJP, editors. Ubiquitous Intelligence and Computing (UIC 2006). vol. 4159 of Lecture Notes in Computer Science. Berlin, Heidelberg: Springer; 2006. p. 912–23. Available from:
  6. 6. Gao M, Lu Y. URAP: a new ultra-lightweight RFID authentication protocol in passive RFID system. J Supercomput. 2022;78(8):10893–905.
  7. 7. Khalid M, Najam-ul Islam M, Mujahid U. URMAP: Ultralightweight Resilient Mutual Authentication Protocol; 2024.
  8. 8. Akiirne Z, Sghir A, Bouzidi D. UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems. Cybersecurity. 2024;7(1):68.
  9. 9. Raheman F. The Q-Day Dilemma and the Quantum Supremacy/Advantage Conjecture; 2022.
  10. 10. Lindsay JR. Surviving the quantum cryptocalypse. SSQ. 2020;14(2):49–73.
  11. 11. Mosca M. Cybersecurity in an era with quantum computers: will we be ready? IEEE Secur Privacy. 2018;16(5):38–41.
  12. 12. Kumar S, Banka H, Kaushik B, Sharma S. An ultra-lightweight secure RFID authentication protocol for low-cost tags. J Comput Virol Hack Tech. 2024;20(4):803–18.
  13. 13. Fan K, Jiang W, Li H, Yang Y. Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans Ind Inform. 2018;14(4):1656–65.
  14. 14. Khan MA, Ullah S, Ahmad T, Jawad K, Buriro A. Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol. Sensors.2023;23(12):5518. https://doi.org/10.3390/s23125518
  15. 15. Yanofsky NS, Mannucci MA. Quantum computing for computer scientists. Cambridge University Press; 2008.
  16. 16. Sarah D, Peter C. On the practical cost of Grover for AES key recovery. Presentation at the 5th NIST PQC Standardization Conference; 2024.
  17. 17. Barker E, Dang Q. Nist special publication 800-57 part 1, revision 4, Tech Rep. NIST; 2016;16. 51 p.
  18. 18. Jang K, Baksi A, Kim H, Song G, Seo H, Chattopadhyay A. Quantum analysis of AES: lowering limit of quantum attack complexity. Hansung University and Nanyang Technological University; n.d.
  19. 19. Jang K, Song G, Kim H, Kwon H, Kim H, Seo H. Efficient implementation of PRESENT and GIFT on quantum computers. Appl Sci. 2021;11(11):4776.
  20. 20. Liu H, Yang L. Quantum key recovery attack on SIMON32/64. Cybersecur. 2021;4(1):23.
  21. 21. Chien HY. SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Trans Dependable Secure Comput. 2007;4(4):337–40.
  22. 22. Tewari A, Gupta BB. Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput. 2016;73(3):1085–102.
  23. 23. Tian Y, Chen G, Li J. A new ultralightweight RFID authentication protocol with permutation. IEEE Commun Lett. 2012;16(5):702–5.
  24. 24. Khalid M, Mujahid U, Muhammad NuI. Ultralightweight RFID authentication protocols for low-cost passive RFID tags. Secur Commun Networks. 2019;2019(1):3295616.
  25. 25. Peris-Lopez P, Hernandez-Castro JC, Tapiador JME, Ribagorda A. Advances in ultralightweight cryptography for low-cost RFID tags: gossamer protocol. In: Chung KI, Sohn K, Yung M, editors. Information security applications. Berlin, Heidelberg: Springer Berlin Heidelberg; 2009. p. 56–68.
  26. 26. Luo H, Wen G, Su J, Huang Z. SLAP: succinct and lightweight authentication protocol for low-cost RFID system. Wireless Netw. 2016;24(1):69–78.
  27. 27. Grassl M, Langenberg B, Roetteler M, Steinwandt R. Applying Grover’s algorithm to AES: quantum resource estimates. International Workshop on Post-Quantum Cryptography. Springer; 2016. p. 29–43.
  28. 28. Chen L, Chen L, Jordan S, Liu YK, Moody D, Peralta R, et al. Report on post-quantum cryptography, vol. 12. US Department of Commerce, National Institute of Standards and Technology; 2016.
  29. 29. Schuster EW, Brock DL, Allen SJ. Global RFID: the value of the EPCglobal network for supply chain management. Springer; 2007.