Paper 2023/243

Memory-Efficient Attacks on Small LWE Keys

Andre Esser, Technology Innovation Institute
Arindam Mukherjee, Indian Institute of Technology Madras
Santanu Sarkar, Indian Institute of Technology Madras
Abstract

Combinatorial attacks on small max norm LWE keys suffer enormous memory requirements, which render them inefficient in realistic attack scenarios. Therefore, more memory-efficient substitutes for these algorithms are needed. In this work, we provide new combinatorial algorithms for recovering small max norm LWE secrets outperforming previous approaches whenever the available memory is limited. We provide analyses of our algorithms for secret key distributions of current NTRU, Kyber and Dilithium variants, showing that our new approach outperforms previous memory-efficient algorithms. For instance, considering uniformly random ternary secrets of length $n$ we improve the best known time complexity for \emph{polynomial memory} algorithms from $2^{1.063n}$ down-to $2^{0.926n}$. We obtain even larger gains for LWE secrets in $\{-m,\ldots,m\}^n$ with $m=2,3$ as found in Kyber and Dilithium. For example, for uniformly random keys in $\{-2,\ldots,2\}^n$ as is the case for Dilithium we improve the previously best time under polynomial memory restriction from $2^{1.742n}$ down-to $2^{1.282n}$. Eventually, we provide novel time-memory trade-offs continuously interpolating between our polynomial memory algorithms and the best algorithms in the unlimited memory case (May, Crypto 2021).

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Journal of Cryptology
DOI
10.1007/s00145-024-09516-3
Keywords
Learning with Errorscombinatorial attacksrepresentation techniquetime-memory trade-off
Contact author(s)
andre r esser @ gmail com
arindamaths @ gmail com
sarkar santanu bir1 @ gmail com
History
2024-08-25: last of 2 revisions
2023-02-21: received
See all versions
Short URL
https://ia.cr/2023/243
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/243,
      author = {Andre Esser and Arindam Mukherjee and Santanu Sarkar},
      title = {Memory-Efficient Attacks on Small {LWE} Keys},
      howpublished = {Cryptology {ePrint} Archive, Paper 2023/243},
      year = {2023},
      doi = {10.1007/s00145-024-09516-3},
      url = {https://eprint.iacr.org/2023/243}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.