2024 - T3 - WS1 - Deployment of post-quantum cryptography

Collection 2024 - T3 - WS1 - Deployment of post-quantum cryptography

Organizer(s) Kahrobaei, Delaram ; Perret, Ludovic ; Smith, Benjamin ; Le Van Gong, Hubert
Date(s) 07/10/2024 - 11/10/2024
linked URL https://indico.math.cnrs.fr/event/5776/
4 17

Lattice cryptography schemes based on the learning with errors (LWE) hardness assumption have been standardized by NIST for use as post-quantum cryptosystems, and by HomomorphicEncryption.org for performing encrypted computations on sensitive data. Thus, understanding their concrete security is critical. Most work on LWE security focuses on theoretical estimates of attack performance, which is important but may overlook attack nuances arising in real-world implementations. Existing concrete benchmarking efforts such as the Darmstadt Lattice Challenge do not include benchmarks relevant to the standardized LWE parameter choices—such as small secret and small error distributions, and Ring-LWE (RLWE) and Module-LWE (MLWE) variants. To improve our understanding of concrete LWE security, we provide the first benchmarks for LWE secret recovery on standardized parameters, for small and low-weight (sparse) secrets.

We evaluate four LWE attacks in these settings to serve as a baseline: the Search-LWE attacks uSVP [9], SALSA [ 51], and Cool&Cruel [44], and the Decision-LWE attack: Dual Hybrid Meet-in-the-Middle (MitM) [22]. We extend the SALSA and Cool&Cruel attacks in significant ways, and implement and scale up MitM attacks for the first time. For example, we recover hamming weight 9 − 11 binomial secrets for KYBER (κ = 2) parameters in 28 − 36 hours with SALSA and Cool&Cruel, while we find that MitM can solve Decision-LWE instances for hamming weights up to 4 in under an hour for Kyber parameters, while uSVP attacks do not recover any secrets after running for more than 1100 hours. We also compare concrete performance against theoretical estimates. Finally, we open source the code to enable future research.

Information about the video

Citation data

  • DOI 10.57987/IHP.2024.T3.WS1.004
  • Cite this video Lauter, Kristin (08/10/2024). Benchmarking attacks on standardized LWE parameters. IHP. Audiovisual resource. DOI: 10.57987/IHP.2024.T3.WS1.004
  • URL https://dx.doi.org/10.57987/IHP.2024.T3.WS1.004

Bibliography

• Benchmarking Attacks on Learning with Errors, E Wenger, E Saxena, M Malhou, E Thieu, K Lauter, to appear in IEEE Security & Privacy 2025. * "SALSA FRESCA: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors." Samuel Stevens et al. Cryptology ePrint Archive, 2024; 150. * "SALSA VERDE: a machine learning attack on learning with errors with sparse small secrets." Cathy Yuanchen Li et al. NIPS ’23: Proceedings of the 37th International Conference on Neural Information Processing Systems. 2024; 2322: 53343—53361. * SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets, Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, François Charton, Kristin Lauter, CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Pages 2606 - 26. * SALSA: Attacking Lattice Cryptography with Transformers, In: Advances in Neural Information Processing Systems 35 (NeurIPS 2022) Main Conference Track, Emily Wenger, Mingjie Chen, Francois Charton, Kristin E. Lauter.

Last related questions on MathOverflow

You have to connect your Carmin.tv account with mathoverflow to add question

Ask a question on MathOverflow




Register

  • Bookmark videos
  • Add videos to see later &
    keep your browsing history
  • Comment with the scientific
    community
  • Get notification updates
    for your favorite subjects
Give feedback