Lower Bounds on Lattice Sieving and Information Set Decoding

  • Elena Kirshanova (Corresponding author)
  • , Thijs Laarhoven

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)

Abstract

In two of the main areas of post-quantum cryptography, based on lattices and codes, nearest neighbor techniques have been used to speed up state-of-the-art cryptanalytic algorithms, and to obtain the lowest asymptotic cost estimates to date [May–Ozerov, Eurocrypt’15; Becker–Ducas–Gama–Laarhoven, SODA’16]. These upper bounds are useful for assessing the security of cryptosystems against known attacks, but to guarantee long-term security one would like to have closely matching lower bounds, showing that improvements on the algorithmic side will not drastically reduce the security in the future. As existing lower bounds from the nearest neighbor literature do not apply to the nearest neighbor problems appearing in this context, one might wonder whether further speedups to these cryptanalytic algorithms can still be found by only improving the nearest neighbor subroutines. We derive new lower bounds on the costs of solving the nearest neighbor search problems appearing in these cryptanalytic settings. For the Euclidean metric we show that for random data sets on the sphere, the locality-sensitive filtering approach of [Becker–Ducas–Gama–Laarhoven, SODA 2016] using spherical caps is optimal, and hence within a broad class of lattice sieving algorithms covering almost all approaches to date, their asymptotic time complexity of 2 0.292 d + o ( d ) is optimal. Similar conditional optimality results apply to lattice sieving variants, such as the 2 0.265 d + o ( d ) complexity for quantum sieving [Laarhoven, PhD thesis 2016] and previously derived complexity estimates for tuple sieving [Herold–Kirshanova–Laarhoven, PKC 2018]. For the Hamming metric we derive new lower bounds for nearest neighbor searching which almost match the best upper bounds from the literature [May–Ozerov, Eurocrypt 2015]. As a consequence we derive conditional lower bounds on decoding attacks, showing that also here one should search for improvements elsewhere to significantly undermine security estimates from the literature.

Original languageEnglish
Title of host publicationAdvances in Cryptology – CRYPTO 2021
Subtitle of host publication41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings
EditorsTal Malkin, Chris Peikert
Place of PublicationCham
PublisherSpringer
Pages791-820
Number of pages30
VolumeII
ISBN (Electronic)978-3-030-84245-1
ISBN (Print)978-3-030-84244-4
DOIs
Publication statusPublished - 11 Aug 2021
Event41st Annual International Cryptology Conference, CRYPTO 2021 - Virtual
Duration: 16 Aug 202120 Aug 2021

Publication series

NameLecture Notes in Computer Science (LNCS)
Volume12826
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference41st Annual International Cryptology Conference, CRYPTO 2021
Abbreviated titleCRYPTO 2021
CityVirtual
Period16/08/2120/08/21

Funding

Funders
Nederlandse Organisatie voor Wetenschappelijk Onderzoek

    Fingerprint

    Dive into the research topics of 'Lower Bounds on Lattice Sieving and Information Set Decoding'. Together they form a unique fingerprint.

    Cite this