decoding random codes asymptotics benchmarks challenges
play

Decoding random codes: asymptotics, benchmarks, challenges, and - PDF document

Decoding random codes: asymptotics, benchmarks, challenges, and implementations D. J. Bernstein University of Illinois at Chicago Assume that were using the McEliece cryptosystem (or Neiderreiter or ) to encrypt a plaintext.


  1. Decoding random codes: asymptotics, benchmarks, challenges, and implementations D. J. Bernstein University of Illinois at Chicago

  2. Assume that we’re using the McEliece cryptosystem (or Neiderreiter or ✿ ✿ ✿ ) to encrypt a plaintext. Usual standard for high security: Choose cryptosystem parameters so that the attacker cannot decrypt the ciphertext.

  3. Assume that we’re using the McEliece cryptosystem (or Neiderreiter or ✿ ✿ ✿ ) to encrypt a plaintext. Usual standard for high security: Choose cryptosystem parameters so that the attacker cannot decrypt the ciphertext. has negligible chance of distinguishing this ciphertext from the ciphertext for another plaintext.

  4. Assume that we’re using the McEliece cryptosystem (or Neiderreiter or ✿ ✿ ✿ ) to encrypt a plaintext. Usual standard for high security: Choose cryptosystem parameters so that the attacker cannot decrypt the ciphertext. has negligible chance of distinguishing this ciphertext from the ciphertext for another plaintext. (Maybe better to account for multi-target; see previous talk.)

  5. Attacker’s success chance increases with more computation, eventually reaching ✙ 1. Public-key cryptography is never information-theoretically secure!

  6. Attacker’s success chance increases with more computation, eventually reaching ✙ 1. Public-key cryptography is never information-theoretically secure! But real-world attackers do not have unlimited computation. The usual standard, quantified: Choose cryptosystem parameters so that attacker has success chance at most ✎ after 2 ❝ computations.

  7. These parameters depend on ❝ and ✎ .

  8. These parameters depend on ❝ and ✎ . Some people assume ❝ ❁ 80.

  9. These parameters depend on ❝ and ✎ . Some people assume ❝ ❁ 80. The ECC2K-130 project will reach 2 77 computations; future projects will break 2 80 . Some people assume ❝ = 128.

  10. These parameters depend on ❝ and ✎ . Some people assume ❝ ❁ 80. The ECC2K-130 project will reach 2 77 computations; future projects will break 2 80 . Some people assume ❝ = 128. Some people count #atoms in universe. Assume ❝ = 384?

  11. These parameters depend on ❝ and ✎ . Some people assume ❝ ❁ 80. The ECC2K-130 project will reach 2 77 computations; future projects will break 2 80 . Some people assume ❝ = 128. Some people count #atoms in universe. Assume ❝ = 384? Less discussion of ✎ . Is it okay for attacker to have 1% success chance? 1/1000? 1/1000000?

  12. How do we handle this variability in ( ❝❀ ✎ )? Strategy 1: A. Convince big community to focus on one ( ❝❀ ✎ ), eliminating the variability. B. Choose parameters.

  13. How do we handle this variability in ( ❝❀ ✎ )? Strategy 1: A. Convince big community to focus on one ( ❝❀ ✎ ), eliminating the variability. B. Choose parameters. Strategy 2—including this talk: A. Accept the variability. B. Choose parameters as functions of ( ❝❀ ✎ ).

  14. How do we handle this variability in ( ❝❀ ✎ )? Strategy 1: A. Convince big community to focus on one ( ❝❀ ✎ ), eliminating the variability. B. Choose parameters. Strategy 2—including this talk: A. Accept the variability. B. Choose parameters as functions of ( ❝❀ ✎ ). 1A more complicated than 2A.

  15. How do we handle this variability in ( ❝❀ ✎ )? Strategy 1: A. Convince big community to focus on one ( ❝❀ ✎ ), eliminating the variability. B. Choose parameters. Strategy 2—including this talk: A. Accept the variability. B. Choose parameters as functions of ( ❝❀ ✎ ). 1A more complicated than 2A. 2B more complicated than 1B.

  16. Helpful simplification for code-based cryptography: All of our best attacks consist of many iterations. Each iteration: small cost 2 ❝ , small success probability ✎ . Separate iterations are almost exactly independent: 2 ❝ ✵ � ❝ iterations cost 2 ❝ ✵ , have success probability almost exactly 1 � (1 � ✎ ) 2 ❝ ✵� ❝ . So parameters are really just functions of 2 ❝ ❂ log(1 ❂ (1 � ✎ )).

  17. Is this simplification correct? Objection 1: Is 2 ❝ ✵ � ❝ an integer?

  18. Is this simplification correct? Objection 1: Is 2 ❝ ✵ � ❝ an integer? Response: Use ❜ 2 ❝ ✵ � ❝ ❝ . Iteration success probability is so small that we care only about ❝ ✵ ✢ ❝ .

  19. Is this simplification correct? Objection 1: Is 2 ❝ ✵ � ❝ an integer? Response: Use ❜ 2 ❝ ✵ � ❝ ❝ . Iteration success probability is so small that we care only about ❝ ✵ ✢ ❝ . Objection 2: “Reusing pivots” makes our best attacks faster but loses some independence.

  20. Is this simplification correct? Objection 1: Is 2 ❝ ✵ � ❝ an integer? Response: Use ❜ 2 ❝ ✵ � ❝ ❝ . Iteration success probability is so small that we care only about ❝ ✵ ✢ ❝ . Objection 2: “Reusing pivots” makes our best attacks faster but loses some independence. Response: Yes, must replace ✎ by result of Markov-chain analysis.

  21. Is this simplification correct? Objection 1: Is 2 ❝ ✵ � ❝ an integer? Response: Use ❜ 2 ❝ ✵ � ❝ ❝ . Iteration success probability is so small that we care only about ❝ ✵ ✢ ❝ . Objection 2: “Reusing pivots” makes our best attacks faster but loses some independence. Response: Yes, must replace ✎ by result of Markov-chain analysis. But can still merge ( ❝❀ ✎ ) into 2 ❝ ❂ log(1 ❂ (1 � ✎ )).

  22. Attacker’s 2 ❝ ❂ log(1 ❂ (1 � ✎ )) depends not only on parameters but also on attack algorithm. Maybe attacker has found a much faster algorithm than anything we know!

  23. Attacker’s 2 ❝ ❂ log(1 ❂ (1 � ✎ )) depends not only on parameters but also on attack algorithm. Maybe attacker has found a much faster algorithm than anything we know! All public-key cryptosystems share this risk.

  24. Attacker’s 2 ❝ ❂ log(1 ❂ (1 � ✎ )) depends not only on parameters but also on attack algorithm. Maybe attacker has found a much faster algorithm than anything we know! All public-key cryptosystems share this risk. Responses to this risk: a huge amount of snake oil, and one standard approach that seems to be effective.

  25. The standard approach: Encourage many smart people to search for speedups. Monitor their progress: big speedup, big speedup, small speedup, big speedup, small, small, tiny, big, small, tiny, small, small, tiny, tiny, small, tiny, tiny, small, tiny, tiny, tiny, tiny. Eventually progress stops. After years, build confidence that optimal algorithm is known.

  26. The standard approach: Encourage many smart people to search for speedups. Monitor their progress: big speedup, big speedup, small speedup, big speedup, small, small, tiny, big, small, tiny, small, small, tiny, tiny, small, tiny, tiny, small, tiny, tiny, tiny, tiny. Eventually progress stops. After years, build confidence that optimal algorithm is known. ✿ ✿ ✿ or is it?

  27. Consider cost of multiplying two ♥ -coeff polys in R [ ① ], where cost means # adds and mults in R . Fast Fourier transform (Gauss): (15 + ♦ (1)) ♥ lg ♥ .

  28. Consider cost of multiplying two ♥ -coeff polys in R [ ① ], where cost means # adds and mults in R . Fast Fourier transform (Gauss): (15 + ♦ (1)) ♥ lg ♥ . Huge interest starting 1965. Split-radix FFT (1968 Yavne): (12 + ♦ (1)) ♥ lg ♥ . Many descriptions, analyses, implementations, followups; 12 was believed optimal.

  29. Consider cost of multiplying two ♥ -coeff polys in R [ ① ], where cost means # adds and mults in R . Fast Fourier transform (Gauss): (15 + ♦ (1)) ♥ lg ♥ . Huge interest starting 1965. Split-radix FFT (1968 Yavne): (12 + ♦ (1)) ♥ lg ♥ . Many descriptions, analyses, implementations, followups; 12 was believed optimal. Tangent FFT (2004 van Buskirk): (34 ❂ 3 + ♦ (1)) ♥ lg ♥ .

  30. Consider cost of multiplying two ♥ -coeff polys in F 2 [ ① ], where cost means # adds and mults in F 2 . Standard schoolbook method: 2 ♥ 2 � 2 ♥ + 1; e.g., 61 for ♥ = 6.

  31. Consider cost of multiplying two ♥ -coeff polys in F 2 [ ① ], where cost means # adds and mults in F 2 . Standard schoolbook method: 2 ♥ 2 � 2 ♥ + 1; e.g., 61 for ♥ = 6. 1963 Karatsuba method: e.g., 59 for ♥ = 6. Many descriptions, analyses, implementations, followups. Improved for large ♥ , but was believed optimal for small ♥ .

  32. Consider cost of multiplying two ♥ -coeff polys in F 2 [ ① ], where cost means # adds and mults in F 2 . Standard schoolbook method: 2 ♥ 2 � 2 ♥ + 1; e.g., 61 for ♥ = 6. 1963 Karatsuba method: e.g., 59 for ♥ = 6. Many descriptions, analyses, implementations, followups. Improved for large ♥ , but was believed optimal for small ♥ . 2000 Bernstein: e.g., 57 for ♥ = 6.

  33. Consider cost of multiplying two ♥ -bit integers in Z , where cost means # NAND gates. Schoolbook: ❖ ( ♥ 2 ).

  34. Consider cost of multiplying two ♥ -bit integers in Z , where cost means # NAND gates. Schoolbook: ❖ ( ♥ 2 ). Intense work after Karatsuba. 1971 Sch¨ onhage–Strassen: ❖ ( ♥ lg ♥ lg lg ♥ ). Used in many theorems. Was believed optimal.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend