Post-Quantum Cryptanalysis of Lattice-Based and Code-Based Cryptosystems
Post-Quantum Cryptanalysis of Lattice-Based and Code-Based Cryptosystems
Let us introduce some notation to analyze the asymptotic 4. Future Research Directions
behavior of LWE. Let q = ncq and σ = ncs . Then for
most the asymptotics parameter settings the time complexity In the full version of the coded-BKW with sieving algo-
of solving LWE is 2(c+o(1))n , where c is a constant that rithm we further improve the asymptotics of the algorithm.
depends on cq and cs .
2. The case where cs < 0.5 is not so interesting cryptographically be-
Example 1 (The Regev Parameters). Regev suggested using cause Regev’s reduction result from worst-case lattice problems to average-
cq = 2 and cs = 1.5 in his original LWE paper case LWE does no apply [16].
[4] M. Baldi, P. Santini, and F. Chiaraluce. Soft McEliece: MDPC code-
based McEliece cryptosystems with very compact keys through real-
valued intentional errors. In 2016 IEEE International Symposium on
Information Theory (ISIT), pages 795–799, July 2016.
[5] Anja Becker, Léo Ducas, Nicolas Gama, and Thijs Laarhoven. New
directions in nearest neighbor searching with applications to lat-
tice sieving. In Proceedings of the Twenty-seventh Annual ACM-
SIAM Symposium on Discrete Algorithms, SODA ’16, pages 10–
24, Philadelphia, PA, USA, 2016. Society for Industrial and Applied
Mathematics.
[6] Daniel J. Bernstein, Johannes Buchmann, and Erik Dahmen. Post
Quantum Cryptography. Springer Publishing Company, Incorporated,
2008.
[7] Avrim Blum, Adam Kalai, and Hal Wasserman. Noise-tolerant
Learning, the Parity Problem, and the Statistical Query Model. J.
ACM, 50(4):506–519, July 2003.
[8] Craig Gentry. Fully Homomorphic Encryption Using Ideal Lattices.
In Proceedings of the Forty-first Annual ACM Symposium on Theory
of Computing, STOC ’09, pages 169–178, New York, NY, USA, 2009.
ACM.
Figure 4. A comparison between the asymptotic behavior of the best
algorithms for solving the LWE problem for different values of cq and [9] Lov K. Grover. A Fast Quantum Mechanical Algorithm for Database
cs . The different colored areas correspond to where the corresponding Search. In STOC, 1996.
algorithm beats the other algorithms in that subplot. [10] Q. Guo, T. Johansson, E. Mrtensson, and P. Stankovski. Information
Set Decoding with Soft Information and some cryptographic applica-
tions. In 2017 IEEE International Symposium on Information Theory
One research direction is to continue on that path and make (ISIT), pages 1793–1797, June 2017.
even more minor improvements. [11] Qian Guo, Thomas Johansson, Erik Mårtensson, and Paul Stankovski.
More important is to investigate the concrete complexity Coded-bkw with sieving. In Tsuyoshi Takagi and Thomas Peyrin,
of the algorithm. For a concrete instance of the LWE prob- editors, Advances in Cryptology – ASIACRYPT 2017, pages 323–346,
lem, what is the number of bit operations needed to solve Cham, 2017. Springer International Publishing.
the problem? So far, lattice reduction algorithms have been [12] Qian Guo, Thomas Johansson, and Paul Stankovski. Coded-BKW:
better for practically solvable instances of LWE. Optimizing Solving LWE Using Lattice Codes. In Rosario Gennaro and Matthew
Robshaw, editors, Advances in Cryptology – CRYPTO 2015, pages
coded-BKW with sieving to see exactly where the cut-off 23–42, Berlin, Heidelberg, 2015. Springer Berlin Heidelberg.
point is, where the algorithm starts to beat lattice reduction,
[13] Paul Kirchner and Pierre-Alain Fouque. An Improved BKW Al-
is an interesting research direction. gorithm for LWE with Applications to Cryptography and Lattices.
In Rosario Gennaro and Matthew Robshaw, editors, Advances in
Acknowledgments Cryptology – CRYPTO 2015, pages 43–62, Berlin, Heidelberg, 2015.
Springer Berlin Heidelberg.
The group is supported in part by the Swedish Research [14] R.J. Mceliece. A Public-Key Cryptosystem Based on Algebraic
Coding Theory. JPL DSN Progress Report, 44, 05 1978.
Council (Grant No. 2015-04528).
The authors would like to thank the Cryptacus 2018 [15] R. Misoczki, J. P. Tillich, N. Sendrier, and P. S. L. M. Barreto. MDPC-
McEliece: New McEliece variants from Moderate Density Parity-
Training School organizers for their generous grant that Check codes. In 2013 IEEE International Symposium on Information
helped support the partiticipation in the school. Theory, pages 2069–2073, July 2013.
[16] Oded Regev. On Lattices, Learning with Errors, Random Linear
References Codes, and Cryptography. In Proceedings of the Thirty-seventh
Annual ACM Symposium on Theory of Computing, STOC ’05, pages
84–93, New York, NY, USA, 2005. ACM.
[1] Martin Albrecht, Carlos Cid, Jean-Charles Faugre, Robert Fitzpatrick,
and Ludovic Perret. On the Complexity of the BKW Algorithm on [17] Peter Williston Shor. Algorithms for Quantum Computation: Discrete
LWE. Designs, Codes and Cryptography, 74, 02 2015. Logarithms and Factoring. In FOCS, pages 124–134. IEEE Computer
Society, 1994.
[2] Martin Albrecht, Rachel Player, and Sam Scott. On the Concrete
Hardness of Learning with Errors. Journal of Mathematical Cryptol- [18] Jacques Stern. A method for finding codewords of small weight.
ogy, 9, 10 2015. In Gérard Cohen and Jacques Wolfmann, editors, Coding Theory
and Applications, pages 106–113, Berlin, Heidelberg, 1989. Springer
[3] Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, and Berlin Heidelberg.
Ludovic Perret. Lazy Modulus Switching for the BKW Algorithm
on LWE. In Hugo Krawczyk, editor, Public-Key Cryptography –
PKC 2014, pages 429–445, Berlin, Heidelberg, 2014. Springer Berlin
Heidelberg.