Cryptology ePrint Archive: Report 2017/221

A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE

Florian Göpfert and Christine van Vredendaal and Thomas Wunderer

Abstract: Recently, an increasing amount of papers proposing post-quantum schemes also provide concrete parameter sets aiming for concrete post-quantum security levels. Security evaluations of such schemes need to include all possible attacks, in particular those by quantum adversaries. In the case of lattice-based cryptography, currently existing quantum attacks are mainly classical attacks, carried out with quantum basis reduction as subroutine.

In this work, we propose a new quantum attack on the learning with errors (LWE) problem, whose hardness is the foundation for many modern lattice-based cryptographic constructions. Our quantum attack is based on Howgrave-Graham's Classical Hybrid Attack and is suitable for LWE instances in recent cryptographic proposals. We analyze its runtime complexity and optimize it over all possible choices of the attack parameters. In addition, we analyze the concrete post-quantum security levels of the parameter sets proposed for the New Hope and Frodo key exchange schemes, as well as several instances of the Lindner-Peikert encryption scheme. Our results show that - depending on the assumed basis reduction costs - our Quantum Hybrid Attack either significantly outperforms, or is at least comparable to all other attacks covered by Albrecht--Player--Scott in their work "On the concrete hardness of Learning with Errors". We further show that our Quantum Hybrid Attack improves upon the Classical Hybrid Attack in the case of LWE with binary error.

Category / Keywords: Lattice-based cryptography, LWE, quantum attack, hybrid attack, public-key encryption

Original Publication (in the same form): PQCrypto 2017

Date: received 2 Mar 2017, last revised 18 Apr 2017

Contact author: twunderer at cdc informatik tu-darmstadt de

Available format(s): PDF | BibTeX Citation

Version: 20170418:094021 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]