### Key Recovery for LWE in Polynomial Time

Kim Laine and Kristin Lauter

##### Abstract

We discuss a higher dimensional generalization of the Hidden Number Problem and generalize the Boneh-Venkatesan method for solving it in polynomial time. We then use this to analyze a key recovery (decoding) attack on LWE which runs in polynomial time using the LLL lattice basis reduction algorithm and Babai's nearest planes method. We prove that success can be guaranteed with overwhelming probability when the error distribution is narrow enough and $q\geq 2^{O(n)}$, where $n$ is the dimension of the secret key. An explicit constant in the exponent is given, but in practice the performance is observed to be significantly better. Our focus is on attacking the search variant of LWE. Known attacks include combinatorial methods, polynomial system solving (Gröbner basis) methods, and lattice reduction methods. Typically the performance of the lattice reduction attacks involves estimating the performance and complexity of BKZ-2.0, which is difficult. Still another option is to attack the decision version of LWE and use the search-to-decision reductions to break the search problem. Our key recovery attack is interesting because it is runs in polynomial time, and yields simple and concrete security estimates for a wide range of parameters depending in a clear and explicit way on the effective approximation factor in the LLL algorithm and in Babai's nearest planes method. We ran the attack for hundreds of LWE instances demonstrating successful key recovery attacks and yielding information about the effective approximation factor as the lattice dimension grows. For example, we successfully recover the secret key for an instance with $n=350$ in about $3.5$ days on a single machine, provided that the modulus is large enough, and the error distribution narrow enough.

Note: Minor typos fixed.

Available format(s)
Publication info
Preprint. MINOR revision.
Keywords
LWEHidden Number Problemkey recoverylattice-based cryptography
Contact author(s)
kim laine @ gmail com
History
2016-02-03: last of 2 revisions
See all versions
Short URL
https://ia.cr/2015/176

CC BY

BibTeX

@misc{cryptoeprint:2015/176,
author = {Kim Laine and Kristin Lauter},
title = {Key Recovery for LWE in Polynomial Time},
howpublished = {Cryptology ePrint Archive, Paper 2015/176},
year = {2015},
note = {\url{https://eprint.iacr.org/2015/176}},
url = {https://eprint.iacr.org/2015/176}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.