29.06.2017 | 1
- F. GΓΆpfert, C. van Vredendaal, Thomas Wunderer
A Hybrid Lattice Reduction and Quantum Search Attack on LWE F. - - PowerPoint PPT Presentation
A Hybrid Lattice Reduction and Quantum Search Attack on LWE F. Gpfert, C. van Vredendaal, Thomas Wunderer 29.06.2017 | 1 Motivation Primal BKW Embedding LWE Hybrid Dual Embedding Make it quantum! Faster More versatile
29.06.2017 | 1
29.06.2017 | 2
29.06.2017 | 3
29.06.2017 | 4
β²
π2
β²
(good) basis πͺ (bad) basis πͺβ² π-dimensional lattice Ξ: a discrete additive subgroup of βπ Basis of a lattice Ξ: lin. ind. πͺ = π1, β¦ , ππ such that Ξ = β€π1 + β¦ + β€ππ. Basis reduction
29.06.2017 | 5
29.06.2017 | 6
Given a target vector π Find (short) difference vector π Bounded Distance Decoding (BDD)
29.06.2017 | 7
π© s e . + b =
πΓπ, π β β€π π
π
mod q
short short
29.06.2017 | 8
29.06.2017 | 9
29.06.2017 | 10
short
29.06.2017 | 11
Quantum-search for π2 β β€π (βGrover-likeβ) Find π1 β β€πβπ with lattice-based techniques:
29.06.2017 | 12
29.06.2017 | 13
29.06.2017 | 14
π = π«ππ
Solve BDD problem: Given π, find ππ
29.06.2017 | 15
π¬( πͺ) Requires sufficiently good basis
29.06.2017 | 16
β² β π (black box for now)
β² = πππͺ π«π2 β²
π1
β²
π2
β²
29.06.2017 | 17
29.06.2017 | 18
ππ over all
ππ
2/3
ππ
2/3
2/3 3/2
29.06.2017 | 19
29.06.2017 | 20
29.06.2017 | 21
π=1 πβπ
β1 max βπ π,β1
2
π = ππ 2βπ1β and ππ is the
πβπ 2 21.06
2/3 3/2
29.06.2017 | 22
29.06.2017 | 23
T
πππ = 20.27πΎ ln πΎ β1.019πΎ+16.1
T
πππ = 20.265πΎ+16.4
πππ
29.06.2017 | 24
725 254 310 377 Attack New Hope Frodo-592 Frodo-752 Frodo-864 Dual 389 173 184 219 Decoding 380
384 171 189 221
Table 1: BKZ with enumeration Table 2: BKZ with sieving
29.06.2017 | 25
Figure 1: BKZ with enumeration
29.06.2017 | 26
Figure 1: BKZ with enumeration
29.06.2017 | 27
29.06.2017 | 28
[HG07] N. Howgrave-Graham. A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack against NTRU. [BGPW16] J. A. Buchmann, F. GΓΆpfert, R. Player, and T. Wunderer. On the Hardness of LWE with Binary Error. [Wun16] T. Wunderer. Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates [GvVW16] F. GΓΆpfert, C. van Vredendaal, T. Wunderer. The Quantum Hybrid Attack. [Babai86] L. Babai. On LovΓ‘szβ Lattice Reduction and the Nearest Lattice Point Problem. [Schank15] J. Schanck. Practical Lattice Cryptosystems: NTRUencrypt and NTRUmls. [Grover96] L. K. Grover. A Fast Quantum Mechanical Algorithm for Database Search. [BHMT02] G. Brassard, P. HΓΈyer, M. Mosca, A. Tapp. Quantum Amplitude Amplification and Estimation. [ADPS16] E. Alkim, L. Ducas, T. PΓΆppelmann, P. Schwabe. Post-quantum Key Exchange - A New Hope.