falcon an update
play

Falcon - An Update Pierre-Alain Fouque 1 Jeffrey Hoffstein 2 Paul - PowerPoint PPT Presentation

Falcon - An Update Pierre-Alain Fouque 1 Jeffrey Hoffstein 2 Paul Kirchner 1 Vadim Lyubashevsky 3 Thomas Pornin 4 Thomas Prest 5 Thomas Ricosset 6 Gregor Seiler 3 William Whyte 7 Zhenfei Zhang 8 What is Falcon? Falcon stands for: Fast Fourier


  1. Falcon - An Update Pierre-Alain Fouque 1 Jeffrey Hoffstein 2 Paul Kirchner 1 Vadim Lyubashevsky 3 Thomas Pornin 4 Thomas Prest 5 Thomas Ricosset 6 Gregor Seiler 3 William Whyte 7 Zhenfei Zhang 8

  2. What is Falcon?  Falcon stands for: Fast Fourier la�ce-based compact signatures over NTRU  Falcon is a:  Signature scheme  Based on the GPV framework [GPV08]  Relying on NTRU la�ces [HHP + 03]  The main design principle: Compactness : to minimize | pk | + | sig |

  3. What’s new? What remained the same?  Almost everything  Specifica�on for NIST levels I and V  Security es�mates What changed?  We removed the parameter set for NIST level III  Specifica�on becomes much simpler  Algorithm count: 22 → 14  Now only one modulus ( q = 12289), one type of ring ( Z [ x ] / ( x n + 1 ) )  New portable and constant-�me implementa�ons Thanks to the community [OSHG19,ZSS18,KRVV19,LAZ19] for helping to improve Falcon.

  4. Falcon in a Nutshell We work over the cyclotomic ring R = Z q [ x ] / ( x n + 1 ) .  Keygen() 1 Gen. matrices A , B with coefficients in R such that: > BA = 0 > B has small coefficients 2 pk ← A 3 sk ← B  Sign( m , sk ) 1 Compute c such that cA = H ( m ) v ← “a vector in the la�ce Λ ( B ) , close to c ” 2 ⇒ c s 3 s ← c − v The signature sig is s = ( s 1 , s 2 ) v  Verify( m , pk , sig ) Accept iff: 1 s is short 2 sA = H ( m )

  5. Security On the theory side , Falcon instan�ates the GPV framework:  Tight security proof in the ROM [GPV08]  Tight security proof in the QROM [BDF + 11] On the prac�cal side , we consider the following lines of a�ack:  La�ce reduc�on ⇒ The most effec�ve [MW16]  Learning a�acks [GJSS01, GS02,NR06, DN12, YD18] ⇒ Impervious by design  “ Overstretched NTRU ” [ABD16,CJL16,KF17] ⇒ Immune by parameters  Combinatorial [How07, BKW00] ⇒ Immune by parameters  Algebraic [CDPR16, CDW17,DPW19] ⇒ Not a threat as far as we know NTRU la�ces:  Extensively studied [HPS98,CS97,May99,MS01,HHPW05,GHN06,How07,Flu15]  “Large” secrets f , g makes Falcon immune against many a�acks

  6. Communica�on Costs at NIST Level V (Spec.) 3 . 11 · 10 6 1 . 71 · 10 6 49 , 216 46 , 282 34 , 032 Public key Signature 27 , 750 bytes ytes in b ize in Siz 6 , 432 5 , 920 4 , 390 3 , 366 1 , 793 1 , 793 1 , 760 1 , 274 1 , 274 204 72 64 64 64 · 10 4 · 10 4 + Falcon Falcon Dilithium qTESLA GeMSS LUOV MQDSS Rainbow Picnic SPHINCS (Lvl III) (Lvl III)

  7. Computa�on Costs at NIST Level V (Spec.) 10 9 9 10 K e y g en S ign V erify 10 8 8 10 cles Running �me in cycles unning �me in cy 10 7 7 10 10 6 6 10 R 10 5 5 10 10 4 4 10 Falcon alcon Dilithium qTESLA GeMSS LUOV MQDSS III) Rainbow Picnic + SPHINCS F III) (Lvl (Lvl

  8.  Integrated to PQClean, pqm4 and SUPERCOP.  The code and associated note are both on Falcon’s website. New Implementa�on(s)  Portable:  If no FPU available, FP arithme�c is so�ware emulated > Performance hit of emula�on ⇒ About one order of magnitude > No infinites, NaNs or subnormals  Tested on x86/PowerPC/ARM, in 32- and 64-bit > Max stack < 3kB > Max RAM < 80 kB  Fully constant-�me:  New Gaussian sampler over the integers > Simple, fast, portable and constant-�me > See Mélissa’s talk this a�ernoon [PRR19]  Variable-�me opera�ons eliminated from signing procedure  Memory accesses only at non-secret addresses

  9. New Implementa�on(s)  Portable:  If no FPU available, FP arithme�c is so�ware emulated > Performance hit of emula�on ⇒ About one order of magnitude > No infinites, NaNs or subnormals  Tested on x86/PowerPC/ARM, in 32- and 64-bit > Max stack < 3kB > Max RAM < 80 kB  Fully constant-�me:  New Gaussian sampler over the integers > Simple, fast, portable and constant-�me > See Mélissa’s talk this a�ernoon [PRR19]  Variable-�me opera�ons eliminated from signing procedure  Memory accesses only at non-secret addresses  Integrated to PQClean, pqm4 and SUPERCOP.  The code and associated note are both on Falcon’s website.

  10. New Implementa�ons - NIST Level V 100000 K e y g en S ign (Dyn ) S ign (Tr ee ) V erify 10000 ond 1000 �ons / sec 100 a per 10 O 1 .1 e , v , � , u a 2 m , n v x e 4 p a f p m f z H z z z M h h h 8 G G G 6 3 3 3 1 3 . 3 . 3 . @ @ @ @ 4 M i 7 i 7 i 7

  11. Falcon can be turned into an IBE (iden�ty-based encryp�on) scheme: Falcon + New Hope = IBE  See [GPV08,DLP14,MSO17] for details  Orders of magnitude faster than pairing-based IBEs Falcon can also be turned into a ring signature scheme (varia�on of [RST01], [LAZ19]).    Addi�onal Features 3 modes of opera�on (sizes in bytes, NIST level V): Classical: | pk | = 1793 | sig | = 1273 Total = 2996 Message-recovery [dLP16]: | pk | = 1793 | sig | = 768 ∗ Total = 2561 Key-recovery [PFH + 19]: | pk | = 64 | sig | = 2506 Total = 2570

  12. Falcon can also be turned into a ring signature scheme (varia�on of [RST01], [LAZ19]).    Addi�onal Features 3 modes of opera�on (sizes in bytes, NIST level V): Classical: | pk | = 1793 | sig | = 1273 Total = 2996 Message-recovery [dLP16]: | pk | = 1793 | sig | = 768 ∗ Total = 2561 Key-recovery [PFH + 19]: | pk | = 64 | sig | = 2506 Total = 2570 Falcon can be turned into an IBE (iden�ty-based encryp�on) scheme: Falcon + New Hope = IBE  See [GPV08, DLP14, MSO17] for details  Orders of magnitude faster than pairing-based IBEs

  13.    Addi�onal Features 3 modes of opera�on (sizes in bytes, NIST level V): Classical: | pk | = 1793 | sig | = 1273 Total = 2996 Message-recovery [dLP16]: | pk | = 1793 | sig | = 768 ∗ Total = 2561 Key-recovery [PFH + 19]: | pk | = 64 | sig | = 2506 Total = 2570 Falcon can be turned into an IBE (iden�ty-based encryp�on) scheme: Falcon + New Hope = IBE  See [GPV08, DLP14, MSO17] for details  Orders of magnitude faster than pairing-based IBEs Falcon can also be turned into a ring signature scheme (varia�on of [RST01], [LAZ19]).

  14. Thank you! Conclusion Falcon is s�ll: Falcon is now:  Secure  Simpler  Compact  Portable  Fast  Constant-�me  Modular (3 modes, IBE, etc.) Use cases: The future:  Cer�ficate authori�es  New, unique func�onali�es  Blockchain  Sanity check: sta�s�cal test suite  Firmware update  IBE  Ring signatures

  15. Conclusion Falcon is s�ll: Falcon is now:  Secure  Simpler  Compact  Portable  Fast  Constant-�me  Modular (3 modes, IBE, etc.) Thank you! Use cases: The future:  Cer�ficate authori�es  New, unique func�onali�es  Blockchain  Sanity check: sta�s�cal test suite  Firmware update  IBE  Ring signatures

  16. Mar�n R. Albrecht, Shi Bai, and Léo Ducas. A subfield la�ce a�ack on overstretched NTRU assump�ons - cryptanalysis of some FHE and graded encoding schemes. In Ma�hew Robshaw and Jonathan Katz, editors, CRYPTO 2016, Part I , volume 9814 of LNCS , pages 153–178. Springer, Heidelberg, August 2016. Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Chris�an Schaffner, and Mark Zhandry. Random oracles in a quantum world. In Dong Hoon Lee and Xiaoyun Wang, editors, ASIACRYPT 2011 , volume 7073 of LNCS , pages 41–69. Springer, Heidelberg, December 2011. Avrim Blum, Adam Kalai, and Hal Wasserman. Noise-tolerant learning, the parity problem, and the sta�s�cal query model. In 32nd ACM STOC , pages 435–440. ACM Press, May 2000. Colin Boyd, editor. ASIACRYPT 2001 , volume 2248 of LNCS . Springer, Heidelberg, December 2001. Ronald Cramer, Léo Ducas, Chris Peikert, and Oded Regev. Recovering short generators of principal ideals in cyclotomic rings. In Marc Fischlin and Jean-Sébas�en Coron, editors, EUROCRYPT 2016, Part II , volume 9666 of LNCS , pages 559–585. Springer, Heidelberg, May 2016. Ronald Cramer, Léo Ducas, and Benjamin Wesolowski.

  17. Short s�ckelberger class rela�ons and applica�on to ideal-SVP. In Coron and Nielsen [CN17], pages 324–348. Jung Hee Cheon, Jinhyuck Jeong, and Changmin Lee. An algorithm for NTRU problems and cryptanalysis of the GGH mul�linear map without a low level encoding of zero. Cryptology ePrint Archive, Report 2016/139, 2016. http://eprint.iacr.org/2016/139 . Jean-Sébas�en Coron and Jesper Buus Nielsen, editors. EUROCRYPT 2017, Part I , volume 10210 of LNCS . Springer, Heidelberg, April / May 2017. Don Coppersmith and Adi Shamir. La�ce a�acks on NTRU. In Walter Fumy, editor, EUROCRYPT’97 , volume 1233 of LNCS , pages 52–61. Springer, Heidelberg, May 1997. Léo Ducas, Vadim Lyubashevsky, and Thomas Prest. Efficient iden�ty-based encryp�on over NTRU la�ces. In Palash Sarkar and Tetsu Iwata, editors, ASIACRYPT 2014, Part II , volume 8874 of LNCS , pages 22–41. Springer, Heidelberg, December 2014. Rafaël del Pino, Vadim Lyubashevsky, and David Pointcheval. The whole is less than the sum of its parts: Construc�ng more efficient la�ce-based AKEs.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend