Improved Estimation of Key Enumeration with Applications to Solving LWE

Alessandro Budroni, Erik Mårtensson

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

Abstract

In post-quantum cryptography (PQC), Learning With Errors (LWE) is one of the dominant underlying mathematical problems. For example, in NIST’s PQC standardization process, the Key Encapsulation Mechanism (KEM) protocol chosen for standardization was Kyber, an LWE-based scheme. Recently the dual attack surpassed the primal attack in terms of concrete complexity for solving the underlying LWE problem for multiple cryptographic schemes, including Kyber. The dual attack consists of a reduction part and a distinguishing part. When estimating the cost of the distinguishing part, one has to estimate the expected cost of enumerating over a certain number of positions of the secret key. Our contribution consists of giving a polynomial-time approach for calculating the expected complexity of such an enumeration procedure. This allows us to revise the complexity of the dual attack on the LWE-based protocols Kyber, Saber and TFHE. For all these schemes we improve upon the total bit-complexity in both the classical and the quantum setting.As our method of calculating the expected cost of enumeration is fairly general, it might be of independent interest in other areas of cryptography or even in other research areas.
Original languageEnglish
Title of host publicationIEEE International Symposium on Information Theory (ISIT)
PublisherIEEE - Institute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)978-1-6654-7554-9
ISBN (Print)978-1-6654-7555-6
DOIs
Publication statusPublished - 2023
Event2023 International Symposium on Information Theory - Taipei, Taiwan
Duration: 2023 Jun 252023 Jun 30

Conference

Conference2023 International Symposium on Information Theory
Abbreviated titleISIT 2023
Country/TerritoryTaiwan
CityTaipei
Period2023/06/252023/06/30

Subject classification (UKÄ)

  • Other Electrical Engineering, Electronic Engineering, Information Engineering
  • Computational Mathematics

Fingerprint

Dive into the research topics of 'Improved Estimation of Key Enumeration with Applications to Solving LWE'. Together they form a unique fingerprint.

Cite this