Learning Strikes Again: the Case of the DRS Signature Scheme
Yang Yu1 L´ eo Ducas2
1Tsinghua University 2Centrum Wiskunde & Informatica
January 2019, London
1 / 42
Learning Strikes Again: the Case of the DRS Signature Scheme Yang Yu - - PowerPoint PPT Presentation
Learning Strikes Again: the Case of the DRS Signature Scheme Yang Yu 1 eo Ducas 2 L 1 Tsinghua University 2 Centrum Wiskunde & Informatica January 2019, London 1 / 42 This is a cryptanalysis work... Target: DRS a NIST lattice-based
1Tsinghua University 2Centrum Wiskunde & Informatica
1 / 42
2 / 42
2 / 42
2 / 42
2 / 42
2 / 42
1 Background 2 DRS signature 3 Learning secret key coefficients 4 Exploiting the leaks 5 Countermeasures 3 / 42
1 Background 2 DRS signature 3 Learning secret key coefficients 4 Exploiting the leaks 5 Countermeasures 4 / 42
5 / 42
5 / 42
5 / 42
6 / 42
6 / 42
1 Hash the message to a random vector m 2 Round m (using S) to v ∈ L
1 Check v ∈ L (using P) 2 Check v is close to m 7 / 42
8 / 42
8 / 42
9 / 42
9 / 42
1 Background 2 DRS signature 3 Learning secret key coefficients 4 Exploiting the leaks 5 Countermeasures 10 / 42
11 / 42
11 / 42
11 / 42
12 / 42
D ⌋→0 · si
12 / 42
D ⌋→0 · si
12 / 42
D ⌋→0 · si
12 / 42
D ⌋→0 · si
12 / 42
D ⌋→0 · si
12 / 42
13 / 42
13 / 42
13 / 42
14 / 42
14 / 42
14 / 42
1 Background 2 DRS signature 3 Learning secret key coefficients 4 Exploiting the leaks 5 Countermeasures 15 / 42
wi wj
(−D,−D) (D,D)
wi wj
(−D,−D) (D,D)
wi wj
(−D,−D) (D,D)
wi wj
(−D,−D) (D,D)
16 / 42
17 / 42
17 / 42
17 / 42
17 / 42
18 / 42
18 / 42
18 / 42
18 / 42
18 / 42
0.0 0.25 0.5 0.75 1
x
0.0 0.25 0.5 0.75 1
y
0.0 0.25 0.5 0.75 1
x
0.0 0.25 0.5 0.75 1
y
0.0 0.25 0.5 0.75 1
x
0.0 0.25 0.5 0.75 1
y
19 / 42
0.0 0.25 0.5 0.75 1
x
0.0 0.25 0.5 0.75 1
y
0.0 0.25 0.5 0.75 1
x
0.0 0.25 0.5 0.75 1
y
0.0 0.25 0.5 0.75 1
x
0.0 0.25 0.5 0.75 1
y
19 / 42
wi wj
(−D,−D) (D,D)
wi wj
(−D,−D) (D,D)
wi wj
(−D,−D) (D,D)
wi wj
(−D,−D) (D,D)
20 / 42
x
y
x
y
x
y
x
y
21 / 42
x
y
x
y
x
y
x
y
21 / 42
22 / 42
22 / 42
22 / 42
22 / 42
22 / 42
22 / 42
22 / 42
0.0 0.25 0.5 0.75 1
x
0.0 0.25 0.5 0.75 1
y
0.0 0.25 0.5 0.75 1
x
0.0 0.25 0.5 0.75 1
y
23 / 42
−20 −10 10 20 0.00 0.05 0.10 0.15 0.20
Si,j =b Si,j =−b Si,j =1 Si,j =−1 Si,j =0
−10 −5 5 10 0.00 0.05 0.10 0.15 0.20 0.25 0.30
Si,j =b Si,j =−b Si,j =1 Si,j =−1 Si,j =0
24 / 42
10 5 5 10
0.00 0.05 0.10 0.15 0.20 0.25 0.30 0.35
Si,j =b Si,j =−b Si,j =1 Si,j =−1 Si,j =0
24 / 42
10 5 5 10
0.00 0.05 0.10 0.15 0.20 0.25 0.30 0.35
Si,j =b Si,j =−b Si,j =1 Si,j =−1 Si,j =0
24 / 42
25 / 42
200 400 600 800
k
0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4
Large coefficient W +
k
W−
k
25 / 42
25 / 42
25 / 42
25 / 42
10 5 5 10
0.00 0.05 0.10 0.15 0.20 0.25 0.30 0.35
Si,j =b Si,j =−b Si,j =1 Si,j =−1 Si,j =0
26 / 42
10 5 5 10
0.00 0.05 0.10 0.15 0.20 0.25 0.30 0.35
Si,j =b Si,j =−b
26 / 42
26 / 42
26 / 42
26 / 42
1 Background 2 DRS signature 3 Learning secret key coefficients 4 Exploiting the leaks 5 Countermeasures 27 / 42
28 / 42
28 / 42
1 d
1 β β
2(β−1)
29 / 42
1 d
1 β β
2(β−1)
29 / 42
1 d
1 β β
2(β−1)
29 / 42
1 d
1 β β
2(β−1)
29 / 42
1 d
1 β β
2(β−1)
29 / 42
30 / 42
30 / 42
30 / 42
31 / 42
∗ ∗ ∗ ∗ ∗ 1 . . . . . . ... ∗ ∗ 1
31 / 42
∗ ∗ ∗ ∗ ∗ 1 . . . . . . ... ∗ ∗ 1
31 / 42
32 / 42
33 / 42
33 / 42
33 / 42
33 / 42
34 / 42
1 Background 2 DRS signature 3 Learning secret key coefficients 4 Exploiting the leaks 5 Countermeasures 35 / 42
36 / 42
36 / 42
36 / 42
36 / 42
37 / 42
37 / 42
50 100 150 200 250 300
1.0 1.5 2.0 2.5 3.0 3.5 log(N) = 15 log(N) = 16 log(N) = 17 log(N) = 18 log(N) = 19 log(N) = 20 50 100 150 200 250 300
0.92 0.94 0.96 0.98 1.00 1.02 1.04 1.06 log(N) = 15 log(N) = 16 log(N) = 17 log(N) = 18 log(N) = 19 log(N) = 20
38 / 42
j,i+j)
50 100 150 200 250 300
1.0 1.5 2.0 2.5 3.0 3.5 log(N) = 15 log(N) = 16 log(N) = 17 log(N) = 18 log(N) = 19 log(N) = 20
i
50 100 150 200 250 300
0.92 0.94 0.96 0.98 1.00 1.02 1.04 1.06 log(N) = 15 log(N) = 16 log(N) = 17 log(N) = 18 log(N) = 19 log(N) = 20
38 / 42
j,i+j)
25 50 75 100 125 150 175 200
1 2 3 4 log(N) = 15 log(N) = 16 log(N) = 17 log(N) = 18 log(N) = 19 log(N) = 20
i
25 50 75 100 125 150 175 200
0.8 1.0 1.2 1.4 1.6 log(N) = 15 log(N) = 16 log(N) = 17 log(N) = 18 log(N) = 19 log(N) = 20
39 / 42
j,i+j)
25 50 75 100 125 150 175 200
1 2 3 4 log(N) = 15 log(N) = 16 log(N) = 17 log(N) = 18 log(N) = 19 log(N) = 20
i
25 50 75 100 125 150 175 200
0.8 1.0 1.2 1.4 1.6 log(N) = 15 log(N) = 16 log(N) = 17 log(N) = 18 log(N) = 19 log(N) = 20
39 / 42
40 / 42
40 / 42
41 / 42
[NR06]. Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. Phong Q. Nguyen and Oded Regev. EUROCRYPT 2006. [DN12]. Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures. L´ eo Ducas and Phong Q. Nguyen. ASIACRYPT 2012. [GPV08]. Trapdoors for hard lattices and new cryptographic constructions. Craig Gentry and Chris Peikert and Vinod Vaikuntanathan. STOC 2008. [PSW08]. A Digital Signature Scheme Based on CVP∞. Thomas Plantard and Willy Susilo and Khin Than Win. PKC 2008. [PSDS17]. DRS : Diagonal dominant Reduction for lattice-based Signature. Thomas Plantard and Arnaud Sipasseuth and Cedric Dumondelle and Willy Susilo. Submitted to the NIST PQC Competition. [ADPS16]. Post-quantum Key Exchange—A New Hope. Erdem Alkim and L´ eo Ducas and Thomas P¨
[AGVW17]. Revisiting the Expected Cost of Solving uSVP and Applications to LWE. Martin R. Albrecht and Florian G¨
[Che13]. R´ eduction de r´ eseau et s´ ecurit´ e concr` ete du chiffrement compl` etement homomorphe. Yuanmi Chen. https://www.theses.fr/2013PA077242. [Alb17]. On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL. Martin R. Albrecht. EUROCRYPT 2017. [APS15]. On the concrete hardness of Learning with Errors. Martin R. Albrecht and Rachel Player and Sam Scott. Journal of Mathematical Cryptology. [Duc17]. Shortest Vector from Lattice Sieving: a Few Dimensions for Free. L´ eo Ducas. EUROCRYPT 2018. [KF17]. Revisiting Lattice Attacks on overstretched NTRU parameters. Paul Kirchner and Pierre-Alain Fouque. EUROCRYPT 2017. [PSDS18]. DRS : Diagonal dominant Reduction for lattice-based Signature Version 2. Thomas Plantard and Arnaud Sipasseuth and Cedric Dumondelle and Willy Susilo. https://www.uow.edu.au/ thomaspl/drs/current/specification.pdf. 42 / 42