Vulnerable Galois RLWE Families and Improved Attacks
نویسندگان
چکیده
Lattice-based cryptography was introduced in the mid 1990s in two different forms, independently by Ajtai-Dwork [AD97] and Hoffstein-Pipher-Silverman [HPSS08]. Thanks to the work of Stehlé-Steinfeld [SS11], we now understand the NTRU cryptosystem introduced by Hoffstein-Pipher-Silverman to be a variant of a cryptosystem which has security reductions to the Ring Learning With Errors (RLWE) problem. The RLWE problem was introduced in [LPR13] as a version of the LWE problem [Reg09]: both problems have reductions to hard lattice problems and thus are interesting for practical applications in cryptography. RLWE has more structure which allows for greater efficiency, but also in some cases additional attacks. The hardness of RLWE is an important problem to study due to applications in cryptography, in particular as the basis of numerous homomorphic encryption schemes [BV11, BV14, BGV12, Bra12, SS11, LATV12, BLLN13]. Although so far in practical cryptographic applications only cyclotomic rings are used, it is interesting to study the hardness of RLWE for general number rings. Recently, new attacks on the RLWE problem for certain number rings and special moduli were introduced [EHL14, ELOS15, CLS15, CIV]. This paper is an extension of [CLS15], and here we explore further the hardness of the RLWE problem for various number rings, construct a new family of vulnerable Galois number fields, give improved attacks for certain rings satisfying some additional assumptions, and apply some number theoretic results on Gauss sums to deduce the likely failure of these attacks for cyclotomic rings and unramified moduli. To be more specific, the RLWE problem is stated given a choice of number ring of degree n, R, modulus q, and error distribution. In cryptographic applications, it is most efficient to sample the error distribution coordinate-wise according to a polynomial basis for the ring. For 2-power cyclotomic rings which are monogenic with a well-behaved power basis, it is justified to sample the RLWE error distribution directly in the polynomial basis for the ring, according to results in [BV11, LPR13, EHL14], where the Polynomial Learning With Errors (PLWE) problem was introduced. Although the PLWE and RLWE problems are equivalent for 2-power cyclotomic fields, in general number rings the two problems are not at all equivalent, as was shown in [ELOS15]. For certain choices of ring, R, and modulus q, efficient attacks on PLWE were presented in [EHL14]. In [ELOS15], these attacks were extended to apply to the decision version of the RLWE problem in certain rings, and in [CLS15, CIV], attacks on the search version of the RLWE problem for certain choices of ring and modulus were presented. So it is important to study the hardness of the both PLWE and RLWE problems and the relationship between the two problems in general rings.
منابع مشابه
Security Considerations for Galois Non-dual RLWE Families
We explore further the hardness of the non-dual discrete variant of the Ring-LWE problem for various number rings, give improved attacks for certain rings satisfying some additional assumptions, construct a new family of vulnerable Galois number fields, and apply some number theoretic results on Gauss sums to deduce the likely failure of these attacks for 2-power cyclotomic rings and unramified...
متن کاملAttacks on Search RLWE
We describe a new attack on the Search Ring Learning-With-Errors (RLWE) problem based on the chi-square statistical test, and give examples of RLWE instances in Galois number fields which are vulnerable to our attack. We prove a search-to-decision reduction for Galois fields which applies for any unramified prime modulus q, regardless of the residue degree f of q, and we use this in our attacks...
متن کاملAttacks on the Search-RLWE problem with small errors
The Ring Learning-With-Errors (RLWE) problem shows great promise for post-quantum cryptography and homomorphic encryption. We describe a new attack on the non-dual search RLWE problem with small error widths, using ring homomorphisms to finite fields and the chi-square statistical test. In particular, we identify a “subfield vulnerability” (Section 5.2) and give a new attack which finds this vu...
متن کاملProvably Weak Instances of Ring-LWE Revisited
In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version of the ring learning with errors problem (RLWE) for two special families of defining polynomials, whose construction depends on the modulus q that is being used. For particularly chosen error parameters, they managed to solve nondual decision RLWE given 20 samples, with a success rate ranging fr...
متن کاملAttacks against search Poly-LWE
The Ring-LWE (RLWE) problem is expected to be a computationally-hard problem even with quantum algorithms. The Poly-LWE (PLWE) problem is closely related to the RLWE problem, and in practice a security base for various recently-proposed cryptosystems. In 2014, Eisentraeger et al. proposed attacks against the decision-variant of the PLWE problem (and in 2015, Elias et al. precisely described and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2016 شماره
صفحات -
تاریخ انتشار 2016