Parameter Estimation for Lattice-Based Cryptosystems By Using Sieving Algorithms

被引:0
|
作者
Akleylek, Sedat [1 ]
Satilmis, Hami [1 ]
机构
[1] Ondokuz Mayis Univ, Bilgisayar Muhendisligi Bolumu, Samsun, Turkey
关键词
sieving algorithms; lattice-based cryptography; SVP; parameter selection;
D O I
10.1109/ubmk.2019.8907018
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The security of quantum resistant lattice-based cryptosystems mainly depend on the shortest vector problem (SVP) or the closest vector problem (CVP). In this paper, sieving algorithms such as ListSieve, GaussSieve, ProGaussSieve and HashSieve are discussed and compared in terms of their complexity and capabilities. The algorithm of Becker et al., used in LIVE-Estimator software, is analyzed by considering HashSieve to generate reliable parameter sets. According to the experimental results, up to 81-bit security level, using HashSieve is comparable with other algorithms. It's shown that for low security levels small key sizes can be obtained.
引用
收藏
页码:372 / 377
页数:6
相关论文
共 50 条
  • [31] Improvement of Lattice-Based Cryptography Using CRT
    Plantard, Thomas
    Rose, Mike
    Susilo, Willy
    QUANTUM COMMUNICATION AND QUANTUM NETWORKING, 2010, 36 : 275 - 282
  • [32] Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems With Chosen Ciphertexts: The Case Study of Kyber
    Xu, Zhuang
    Pemberton, Owen Michael
    Roy, Sujoy Sinha
    Oswald, David
    Yao, Wang
    Zheng, Zhiming
    IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (09) : 2163 - 2176
  • [33] A Multiplatform Parallel Approach for Lattice Sieving Algorithms
    Andrzejczak, Michal
    Gaj, Kris
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2020, PT I, 2020, 12452 : 661 - 680
  • [34] A Novel Combined Correlation Power Analysis (CPA) Attack on Schoolbook Polynomial Multiplication in Lattice-based Cryptosystems
    Lu, Chuanchao
    Cui, Yijun
    Khalid, Ayesha
    Gu, Chongyan
    Wang, Chenghua
    Liu, Weiqiang
    2022 IEEE 35TH INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (IEEE SOCC 2022), 2022, : 225 - 230
  • [35] Investigating Vulnerabilities in RSA-like Cryptosystems Through Lattice-based Attacks on Small Exponent Keys
    Kumagai, Sou
    Kanzawa, Shota
    Huda, Samsul
    Kodera, Yuta
    Nogami, Yasuyuki
    2024 11TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN, ICCE-TAIWAN 2024, 2024, : 585 - 586
  • [36] Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms
    Gonzalez de la Torre, Miguel Angel
    Hernandez Encinas, Luis
    Queiruga-Dios, Araceli
    MATHEMATICS, 2022, 10 (16)
  • [37] Weight Factor Algorithms for Activity Recognition in Lattice-Based Sensor Fusion
    Liao, Jing
    Bi, Yaxin
    Nugent, Chris
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, 2011, 7091 : 365 - 376
  • [38] Analysing the potential of transport triggered architecture for lattice-based cryptography algorithms
    Akcay, Latif
    Yalcin, Berna Ors
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2022, 15 (05) : 404 - 420
  • [39] LATTICE IMPLEMENTATION OF SOME RECURSIVE PARAMETER-ESTIMATION ALGORITHMS
    FRIEDLANDER, B
    INTERNATIONAL JOURNAL OF CONTROL, 1983, 37 (04) : 661 - 684
  • [40] Lattice-based cryptography
    Regev, Oded
    ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 131 - 141