Security Impact Analysis of Degree of Field Extension in Lattice Attacks on Ring-LWE Problem

05/25/2023
by   Yuri Lucas Direbieski, et al.
0

Modern information communications use cryptography to keep the contents of communications confidential. RSA (Rivest-Shamir-Adleman) cryptography and elliptic curve cryptography, which are public-key cryptosystems, are widely used cryptographic schemes. However, it is known that these cryptographic schemes can be deciphered in a very short time by Shor's algorithm when a quantum computer is put into practical use. Therefore, several methods have been proposed for quantum computer-resistant cryptosystems that cannot be cracked even by a quantum computer. A simple implementation of LWE-based lattice cryptography based on the LWE (Learning With Errors) problem requires a key length of O(n^2) to ensure the same level of security as existing public-key cryptography schemes such as RSA and elliptic curve cryptography. In this paper, we attacked the Ring-LWE (RLWE) scheme, which can be implemented with a short key length, with a modified LLL (Lenstra-Lenstra-Lovász) basis reduction algorithm and investigated the trend in the degree of field extension required to generate a secure and small key. Results showed that the lattice-based cryptography may be strengthened by employing Cullen or Mersenne prime numbers as the degree of field extension.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/31/2018

The Impact of Quantum Computing on Present Cryptography

The aim of this paper is to elucidate the implications of quantum comput...
research
02/06/2022

On the High Dimensional RSA Algorithm – A Public Key Cryptosystem Based on Lattice and Algebraic Number Theory

The most known of public key cryptosystem was introduced in 1978 by Rive...
research
07/11/2022

SALSA: Attacking Lattice Cryptography with Transformers

Currently deployed public-key cryptosystems will be vulnerable to attack...
research
02/05/2022

A proof of P != NP (New symmetric encryption algorithm against any linear attacks and differential attacks)

P vs NP problem is the most important unresolved problem in the field of...
research
11/24/2022

Number Theoretic Transform and Its Applications in Lattice-based Cryptosystems: A Survey

Number theoretic transform (NTT) is the most efficient method for multip...
research
06/05/2020

Applied Awareness: Test-Driven GUI Development using Computer Vision and Cryptography

Graphical user interface testing is significantly challenging, and autom...
research
08/30/2022

Integral Sampler and Polynomial Multiplication Architecture for Lattice-based Cryptography

With the surge of the powerful quantum computer, lattice-based cryptogra...

Please sign up or login with your details

Forgot password? Click here to reset