The NTRU Encryption Scheme, and Ideal Lattices

The NTRU Encryption Scheme, and Ideal Lattices

Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion The NTRU encryption scheme, and ideal lattices Damien Stehl´e Based on joint work with Ron Steinfeld Sibenik,ˇ June 2015 perso.ens-lyon.fr/damien.stehle/NTRU.html Damien Stehl´e The NTRU encryption scheme 05/06/2015 1/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion The NTRU encryption scheme NTRUEncrypt:A public-key encryption scheme. 1996: Proposed by Hoffstein, Pipher & Silverman. 1997: Lattice attacks by Coppersmith & Shamir. 1998: Revised by Hoffstein et al. In the last 20 years: Several limited improvements to the lattice attacks. Attacks for isolated sets of parameters. But the design has proved very robust. Damien Stehl´e The NTRU encryption scheme 05/06/2015 2/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion The NTRU encryption scheme NTRUEncrypt:A public-key encryption scheme. 1996: Proposed by Hoffstein, Pipher & Silverman. 1997: Lattice attacks by Coppersmith & Shamir. 1998: Revised by Hoffstein et al. In the last 20 years: Several limited improvements to the lattice attacks. Attacks for isolated sets of parameters. But the design has proved very robust. Damien Stehl´e The NTRU encryption scheme 05/06/2015 2/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion Why studying NTRUEncrypt? NTRUEncrypt is a practical scheme that seems secure. Standardized: IEEE P1363. Commercialized: Security Innovation. Super-fast: Encryption: a bit faster Decryption ∼ 100 times faster Asymptotically: Oe(λ) versus Oe(λ6), for security 2λ Interesting security features: No integer factoring nor discrete logs Seems to resist practical attacks Seems to resist quantum attacks Damien Stehl´e The NTRU encryption scheme 05/06/2015 3/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion Why studying NTRUEncrypt? NTRUEncrypt is a practical scheme that seems secure. Standardized: IEEE P1363. Commercialized: Security Innovation. Super-fast: Encryption: a bit faster Decryption ∼ 100 times faster Asymptotically: Oe(λ) versus Oe(λ6), for security 2λ Interesting security features: No integer factoring nor discrete logs Seems to resist practical attacks Seems to resist quantum attacks Damien Stehl´e The NTRU encryption scheme 05/06/2015 3/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion Why studying NTRUEncrypt? NTRUEncrypt is a practical scheme that seems secure. Standardized: IEEE P1363. Commercialized: Security Innovation. Super-fast: Encryption: a bit faster Decryption ∼ 100 times faster Asymptotically: Oe(λ) versus Oe(λ6), for security 2λ Interesting security features: No integer factoring nor discrete logs Seems to resist practical attacks Seems to resist quantum attacks Damien Stehl´e The NTRU encryption scheme 05/06/2015 3/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion And NTRUSign? NTRUSign is a digital signature counterpart of NTRUEncrypt. 2001: First proposal, called NSS [HoPiSi01]. 2001: Cryptanalysis, by Gentry, Jonsson, Stern and Szydlo. 2001: First repair. 2002: Re-broken, by Gentry and Szydlo. Since then: many breaks and repairs. Standardized and commercialized. Super-fast, before the Nguyen-Regev attack (2009). It may be thwarted, but with big performance impact. Fixed NTRUSign not competitive, e.g. compared to BLISS. Damien Stehl´e The NTRU encryption scheme 05/06/2015 4/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion And NTRUSign? NTRUSign is a digital signature counterpart of NTRUEncrypt. 2001: First proposal, called NSS [HoPiSi01]. 2001: Cryptanalysis, by Gentry, Jonsson, Stern and Szydlo. 2001: First repair. 2002: Re-broken, by Gentry and Szydlo. Since then: many breaks and repairs. Standardized and commercialized. Super-fast, before the Nguyen-Regev attack (2009). It may be thwarted, but with big performance impact. Fixed NTRUSign not competitive, e.g. compared to BLISS. Damien Stehl´e The NTRU encryption scheme 05/06/2015 4/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion And NTRUSign? NTRUSign is a digital signature counterpart of NTRUEncrypt. 2001: First proposal, called NSS [HoPiSi01]. 2001: Cryptanalysis, by Gentry, Jonsson, Stern and Szydlo. 2001: First repair. 2002: Re-broken, by Gentry and Szydlo. Since then: many breaks and repairs. Standardized and commercialized. Super-fast, before the Nguyen-Regev attack (2009). It may be thwarted, but with big performance impact. Fixed NTRUSign not competitive, e.g. compared to BLISS. Damien Stehl´e The NTRU encryption scheme 05/06/2015 4/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion And NTRUSign? NTRUSign is a digital signature counterpart of NTRUEncrypt. 2001: First proposal, called NSS [HoPiSi01]. 2001: Cryptanalysis, by Gentry, Jonsson, Stern and Szydlo. 2001: First repair. 2002: Re-broken, by Gentry and Szydlo. Since then: many breaks and repairs. Standardized and commercialized. Super-fast, before the Nguyen-Regev attack (2009). It may be thwarted, but with big performance impact. Fixed NTRUSign not competitive, e.g. compared to BLISS. Damien Stehl´e The NTRU encryption scheme 05/06/2015 4/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion And NTRUSign? NTRUSign is a digital signature counterpart of NTRUEncrypt. 2001: First proposal, called NSS [HoPiSi01]. 2001: Cryptanalysis, by Gentry, Jonsson, Stern and Szydlo. 2001: First repair. 2002: Re-broken, by Gentry and Szydlo. Since then: many breaks and repairs. Standardized and commercialized. Super-fast, before the Nguyen-Regev attack (2009). It may be thwarted, but with big performance impact. Fixed NTRUSign not competitive, e.g. compared to BLISS. Damien Stehl´e The NTRU encryption scheme 05/06/2015 4/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion And NTRUSign? NTRUSign is a digital signature counterpart of NTRUEncrypt. 2001: First proposal, called NSS [HoPiSi01]. 2001: Cryptanalysis, by Gentry, Jonsson, Stern and Szydlo. 2001: First repair. 2002: Re-broken, by Gentry and Szydlo. Since then: many breaks and repairs. Standardized and commercialized. Super-fast, before the Nguyen-Regev attack (2009). It may be thwarted, but with big performance impact. Fixed NTRUSign not competitive, e.g. compared to BLISS. Damien Stehl´e The NTRU encryption scheme 05/06/2015 4/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion Outline of the talk 1- Regular NTRUEncrypt 2- Attacks on NTRUEncrypt 3- The Ideal-SVP and Ring-LWE problems 4- A provably secure NTRUEncrypt Damien Stehl´e The NTRU encryption scheme 05/06/2015 5/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion Polynomial Rings: Generalizing Z Take Φ 2 Z[x] monic of degree n. Φ h i R := Z[x]=(Φ); +; × : Some interesting Φ’s: Φ = xn − 1 ! R−, Φ = xn + 1 ! R+. For n a power of 2, the ring R+ is isomorphic to the ring of iπ=n integers of K = Q[e ]: n K ' Q[x]=(x + 1) n OK ' Z[x]=(x + 1): ) Rich algebraic structure (great for design and proofs). Damien Stehl´e The NTRU encryption scheme 05/06/2015 6/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion Polynomial Rings: Generalizing Z Take Φ 2 Z[x] monic of degree n. Φ h i R := Z[x]=(Φ); +; × : Some interesting Φ’s: Φ = xn − 1 ! R−, Φ = xn + 1 ! R+. For n a power of 2, the ring R+ is isomorphic to the ring of iπ=n integers of K = Q[e ]: n K ' Q[x]=(x + 1) n OK ' Z[x]=(x + 1): ) Rich algebraic structure (great for design and proofs). Damien Stehl´e The NTRU encryption scheme 05/06/2015 6/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion Polynomial Rings: Generalizing Z Take Φ 2 Z[x] monic of degree n. Φ h i R := Z[x]=(Φ); +; × : Some interesting Φ’s: Φ = xn − 1 ! R−, Φ = xn + 1 ! R+. For n a power of 2, the ring R+ is isomorphic to the ring of iπ=n integers of K = Q[e ]: n K ' Q[x]=(x + 1) n OK ' Z[x]=(x + 1): ) Rich algebraic structure (great for design and proofs). Damien Stehl´e The NTRU encryption scheme 05/06/2015 6/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion Polynomial Rings: Generalizing Z=qZ Let q ≥ 2 and Zq = Z=qZ. Φ h i Rq := Zq[x]=(Φ); +; × : Φ Arithmetic in Rq costs Oe(n log q). + Rq is isomorphic to OK =(q). The key to decryption correctness If f 2 RΦ is known to have coefficients in (−q=2; q=2), then f mod q uniquely determines f . Damien Stehl´e The NTRU encryption scheme 05/06/2015 7/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion Polynomial Rings: Generalizing Z=qZ Let q ≥ 2 and Zq = Z=qZ. Φ h i Rq := Zq[x]=(Φ); +; × : Φ Arithmetic in Rq costs Oe(n log q). + Rq is isomorphic to OK =(q). The key to decryption correctness If f 2 RΦ is known to have coefficients in (−q=2; q=2), then f mod q uniquely determines f . Damien Stehl´e The NTRU encryption scheme 05/06/2015 7/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion Polynomial Rings: Generalizing Z=qZ Let q ≥ 2 and Zq = Z=qZ. Φ h i Rq := Zq[x]=(Φ); +; × : Φ Arithmetic in Rq costs Oe(n log q). + Rq is isomorphic to OK =(q). The key to decryption correctness If f 2 RΦ is known to have coefficients in (−q=2; q=2), then f mod q uniquely determines f . Damien Stehl´e The NTRU encryption scheme 05/06/2015 7/30 Introduction Regular NTRUEncrypt Attacks on NTRU Ring-LWE Securing NTRUEncrypt Conclusion Description of NTRUEncrypt: Key Generation Parameters: n, q a power of 2 (e.g.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    76 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us