A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE
The dual attack is one of the most efficient attack algorithms for learning with errors (LWE) problem. Recently, an efficient variant of the dual attack for sparse and small secret LWE was reported by Albrecht (Eurocrypt 2017), which forces some LWE-based cryptosystems, especially fully homomorphic...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8747481/ |
id |
doaj-ddec110cef8f41b693d9e375721ed922 |
---|---|
record_format |
Article |
spelling |
doaj-ddec110cef8f41b693d9e375721ed9222021-03-29T23:31:34ZengIEEEIEEE Access2169-35362019-01-017894978950610.1109/ACCESS.2019.29254258747481A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWEJung Hee Cheon0Minki Hhan1Seungwan Hong2Yongha Son3https://orcid.org/0000-0003-1394-234XDepartment of Mathematical Sciences, Seoul National University, Seoul, South KoreaDepartment of Mathematical Sciences, Seoul National University, Seoul, South KoreaDepartment of Mathematical Sciences, Seoul National University, Seoul, South KoreaDepartment of Mathematical Sciences, Seoul National University, Seoul, South KoreaThe dual attack is one of the most efficient attack algorithms for learning with errors (LWE) problem. Recently, an efficient variant of the dual attack for sparse and small secret LWE was reported by Albrecht (Eurocrypt 2017), which forces some LWE-based cryptosystems, especially fully homomorphic encryptions (FHE), to change parameters. In this paper, we propose a new hybrid of dual and meet-in-themiddle (MITM) attack, which outperforms the improved variant on the same LWE parameter regime. To this end, we adapt the MITM attack for NTRU due to Odlyzko to LWE and give a rigorous analysis for it. The performance of our MITM attack depends on the relative size of error and modulus, and hence, for a large modulus LWE samples, our MITM attack works well for quite large error. We then combine our MITM attack with Albrecht's observation that understands the dual attack as a dimension-error tradeoff, which finally yields our hybrid attack. We also implement a sage module that estimates the attack complexity of our algorithm upon LWE-estimator, and our attack shows significant performance improvement for the LWE parameter for FHE. For example, for the LWE problem with dimension n = 2<sup>15</sup>, modulus q = 2<sup>628</sup>, and ternary secret key with Hamming weight 64 which is one parameter set used for HEAAN bootstrapping (Eurocrypt 2018), our attack takes 2<sup>112.5</sup> operations and 2<sup>70.6</sup> bit memory, while the previous best attack requires 2<sup>127.2</sup> operations as reported by the LWE-estimator.https://ieeexplore.ieee.org/document/8747481/Cryptanalysisfully homomorphic encryptionlearning with errorsmeet-in-the-middle |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Jung Hee Cheon Minki Hhan Seungwan Hong Yongha Son |
spellingShingle |
Jung Hee Cheon Minki Hhan Seungwan Hong Yongha Son A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE IEEE Access Cryptanalysis fully homomorphic encryption learning with errors meet-in-the-middle |
author_facet |
Jung Hee Cheon Minki Hhan Seungwan Hong Yongha Son |
author_sort |
Jung Hee Cheon |
title |
A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE |
title_short |
A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE |
title_full |
A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE |
title_fullStr |
A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE |
title_full_unstemmed |
A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE |
title_sort |
hybrid of dual and meet-in-the-middle attack on sparse and ternary secret lwe |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
The dual attack is one of the most efficient attack algorithms for learning with errors (LWE) problem. Recently, an efficient variant of the dual attack for sparse and small secret LWE was reported by Albrecht (Eurocrypt 2017), which forces some LWE-based cryptosystems, especially fully homomorphic encryptions (FHE), to change parameters. In this paper, we propose a new hybrid of dual and meet-in-themiddle (MITM) attack, which outperforms the improved variant on the same LWE parameter regime. To this end, we adapt the MITM attack for NTRU due to Odlyzko to LWE and give a rigorous analysis for it. The performance of our MITM attack depends on the relative size of error and modulus, and hence, for a large modulus LWE samples, our MITM attack works well for quite large error. We then combine our MITM attack with Albrecht's observation that understands the dual attack as a dimension-error tradeoff, which finally yields our hybrid attack. We also implement a sage module that estimates the attack complexity of our algorithm upon LWE-estimator, and our attack shows significant performance improvement for the LWE parameter for FHE. For example, for the LWE problem with dimension n = 2<sup>15</sup>, modulus q = 2<sup>628</sup>, and ternary secret key with Hamming weight 64 which is one parameter set used for HEAAN bootstrapping (Eurocrypt 2018), our attack takes 2<sup>112.5</sup> operations and 2<sup>70.6</sup> bit memory, while the previous best attack requires 2<sup>127.2</sup> operations as reported by the LWE-estimator. |
topic |
Cryptanalysis fully homomorphic encryption learning with errors meet-in-the-middle |
url |
https://ieeexplore.ieee.org/document/8747481/ |
work_keys_str_mv |
AT jungheecheon ahybridofdualandmeetinthemiddleattackonsparseandternarysecretlwe AT minkihhan ahybridofdualandmeetinthemiddleattackonsparseandternarysecretlwe AT seungwanhong ahybridofdualandmeetinthemiddleattackonsparseandternarysecretlwe AT yonghason ahybridofdualandmeetinthemiddleattackonsparseandternarysecretlwe AT jungheecheon hybridofdualandmeetinthemiddleattackonsparseandternarysecretlwe AT minkihhan hybridofdualandmeetinthemiddleattackonsparseandternarysecretlwe AT seungwanhong hybridofdualandmeetinthemiddleattackonsparseandternarysecretlwe AT yonghason hybridofdualandmeetinthemiddleattackonsparseandternarysecretlwe |
_version_ |
1724189365696987136 |