How (Not) to Instantiate Ring-LWE Chris Peikert
University of Michigan Security and Cryptography for Networks 1 September 2016
1 / 12
How (Not) to Instantiate Ring-LWE Chris Peikert University of - - PowerPoint PPT Presentation
How (Not) to Instantiate Ring-LWE Chris Peikert University of Michigan Security and Cryptography for Networks 1 September 2016 1 / 12 Conclusions 2 / 12 Conclusions 1 Prior insecure Ring-LWE instantiations turn out to use quite narrow error
1 / 12
2 / 12
2 / 12
2 / 12
2 / 12
3 / 12
3 / 12
3 / 12
3 / 12
3 / 12
3 / 12
3 / 12
3 / 12
3 / 12
4 / 12
4 / 12
4 / 12
4 / 12
4 / 12
4 / 12
4 / 12
4 / 12
5 / 12
5 / 12
5 / 12
5 / 12
5 / 12
5 / 12
6 / 12
6 / 12
6 / 12
6 / 12
6 / 12
7 / 12
⋆ New, unified exposition in terms of short elements in dual ideals, and
7 / 12
⋆ New, unified exposition in terms of short elements in dual ideals, and
⋆ Insecurity is due to use of incongruous error distributions that are
7 / 12
⋆ New, unified exposition in terms of short elements in dual ideals, and
⋆ Insecurity is due to use of incongruous error distributions that are
7 / 12
⋆ New, unified exposition in terms of short elements in dual ideals, and
⋆ Insecurity is due to use of incongruous error distributions that are
⋆ Theorem holds for any number ring, so the rings themselves are not the
7 / 12
⋆ New, unified exposition in terms of short elements in dual ideals, and
⋆ Insecurity is due to use of incongruous error distributions that are
⋆ Theorem holds for any number ring, so the rings themselves are not the
⋆ Hard error distributions are much wider & differently shaped than the
7 / 12
8 / 12
8 / 12
8 / 12
8 / 12
8 / 12
8 / 12
8 / 12
9 / 12
9 / 12
9 / 12
9 / 12
10 / 12
10 / 12
10 / 12
10 / 12
11 / 12
11 / 12
11 / 12
11 / 12
11 / 12
11 / 12
11 / 12
12 / 12
12 / 12
12 / 12
12 / 12