Skip to main content

2020 | OriginalPaper | Buchkapitel

LWE with Side Information: Attacks and Concrete Security Estimation

verfasst von : Dana Dachman-Soled, Léo Ducas, Huijing Gong, Mélissa Rossi

Erschienen in: Advances in Cryptology – CRYPTO 2020

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We propose a framework for cryptanalysis of lattice-based schemes, when side information—in the form of “hints”—about the secret and/or error is available. Our framework generalizes the so-called primal lattice reduction attack, and allows the progressive integration of hints before running a final lattice reduction step. Our techniques for integrating hints include sparsifying the lattice, projecting onto and intersecting with hyperplanes, and/or altering the distribution of the secret vector. Our main contribution is to propose a toolbox and a methodology to integrate such hints into lattice reduction attacks and to predict the performance of those lattice attacks with side information.
While initially designed for side-channel information, our framework can also be used in other cases: exploiting decryption failures, or simply exploiting constraints imposed by certain schemes (LAC, Round5, NTRU).
We implement a Sage 9.0 toolkit to actually mount such attacks with hints when computationally feasible, and to predict their performances on larger instances. We provide several end-to-end application examples, such as an improvement of a single trace attack on Frodo by Bos et al. (SAC 2018). In particular, our work can estimates security loss even given very little side information, leading to a smooth measurement/computation trade-off for side-channel attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
One may then re-amplify the success probability by retrying the attack making guesses at different locations.
 
2
We are thankful to Thibauld Feneuil for pointing out an incorrect equation in a previous version of this paper.
 
3
While we would have preferred a full python implementation, we are making a heavy use of linear algebra over the rationals for which we could find no convenient python library.
 
Literatur
2.
Zurück zum Zitat Albrecht, M.R., Deo, A., Paterson, K.G.: Cold boot attacks on ring and module LWE keys under the NTT. IACR TCHES 2018, 173–213 (2018) Albrecht, M.R., Deo, A., Paterson, K.G.: Cold boot attacks on ring and module LWE keys under the NTT. IACR TCHES 2018, 173–213 (2018)
4.
Zurück zum Zitat Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange—a new hope. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 327–343 (2016) Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange—a new hope. In: 25th USENIX Security Symposium (USENIX Security 2016), pp. 327–343 (2016)
5.
Zurück zum Zitat Bai, S., Miller, S., Wen, W.: A refined analysis of the cost for solving LWE via uSVP. Cryptology ePrint Archive, Report 2019/502 (2019) Bai, S., Miller, S., Wen, W.: A refined analysis of the cost for solving LWE via uSVP. Cryptology ePrint Archive, Report 2019/502 (2019)
8.
Zurück zum Zitat Bos, J.W., et al.: Frodo: take off the ring! Practical, quantum-secure key exchange from LWE, pp. 1006–1018 (2016) Bos, J.W., et al.: Frodo: take off the ring! Practical, quantum-secure key exchange from LWE, pp. 1006–1018 (2016)
14.
Zurück zum Zitat D’Anvers, J.-P., Vercauteren, F., Verbauwhede, I.: On the impact of decryption failures on the security of LWE/LWR based schemes. IACR Cryptology ePrint Archive, 2018:1089 (2018) D’Anvers, J.-P., Vercauteren, F., Verbauwhede, I.: On the impact of decryption failures on the security of LWE/LWR based schemes. IACR Cryptology ePrint Archive, 2018:1089 (2018)
16.
Zurück zum Zitat Garcia-Morchon, O., et al.: Round5. Technical report, NIST (2019) Garcia-Morchon, O., et al.: Round5. Technical report, NIST (2019)
18.
Zurück zum Zitat Groot Bruinderink, L., Pessl, P.: Differential fault attacks on deterministic lattice signatures. IACR TCHES 2018, 21–43 (2018) Groot Bruinderink, L., Pessl, P.: Differential fault attacks on deterministic lattice signatures. IACR TCHES 2018, 21–43 (2018)
21.
22.
Zurück zum Zitat Khachiyan, L.: On the complexity of approximating extremal determinants in matrices. J. Complex. 11, 138–153 (1995)MathSciNetCrossRef Khachiyan, L.: On the complexity of approximating extremal determinants in matrices. J. Complex. 11, 138–153 (1995)MathSciNetCrossRef
27.
Zurück zum Zitat McCann, D., Oswald, E., Whitnall, C.: Towards practical tools for side channel aware software engineering: ‘grey box’ modelling for instruction leakages. In: 26th USENIX Security Symposium (USENIX Security 2017), Vancouver, BC, pp. 199–216. USENIX Association, August 2017 McCann, D., Oswald, E., Whitnall, C.: Towards practical tools for side channel aware software engineering: ‘grey box’ modelling for instruction leakages. In: 26th USENIX Security Symposium (USENIX Security 2017), Vancouver, BC, pp. 199–216. USENIX Association, August 2017
28.
Zurück zum Zitat Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37, 267–302 (2007)MathSciNetCrossRef Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37, 267–302 (2007)MathSciNetCrossRef
31.
Zurück zum Zitat Pöppelmann, T., et al.: NewHope. Technical report, NIST (2019) Pöppelmann, T., et al.: NewHope. Technical report, NIST (2019)
32.
Zurück zum Zitat Ravi, P., Jhanwar, M.P., Howe, J., Chattopadhyay, A., Bhasin, S.: Side-channel assisted existential forgery attack on Dilithium - a NIST PQC candidate. Cryptology ePrint Archive, Report 2018/821 (2018) Ravi, P., Jhanwar, M.P., Howe, J., Chattopadhyay, A., Bhasin, S.: Side-channel assisted existential forgery attack on Dilithium - a NIST PQC candidate. Cryptology ePrint Archive, Report 2018/821 (2018)
33.
Zurück zum Zitat Ravi, P., Jhanwar, M.P., Howe, J., Chattopadhyay, A., Bhasin, S.: Exploiting determinism in lattice-based signatures: practical fault attacks on pqm4 implementations of NIST candidates. In: Asia CCS 2019, pp. 427–440. Association for Computing Machinery (2019) Ravi, P., Jhanwar, M.P., Howe, J., Chattopadhyay, A., Bhasin, S.: Exploiting determinism in lattice-based signatures: practical fault attacks on pqm4 implementations of NIST candidates. In: Asia CCS 2019, pp. 427–440. Association for Computing Machinery (2019)
34.
Zurück zum Zitat Schwabe, P., et al.: CRYSTALS-KYBER. Technical report, NIST (2019) Schwabe, P., et al.: CRYSTALS-KYBER. Technical report, NIST (2019)
Metadaten
Titel
LWE with Side Information: Attacks and Concrete Security Estimation
verfasst von
Dana Dachman-Soled
Léo Ducas
Huijing Gong
Mélissa Rossi
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-56880-1_12