Paper 2024/1173

Cryptanalysis of Rank-2 Module-LIP with Symplectic Automorphisms

Hengyi Luo, Academy of Mathematics and Systems Science
Kaijie Jiang, Tsinghua University
Yanbin Pan, Academy of Mathematics and Systems Science
Anyu Wang, Tsinghua University
Abstract

At Eurocrypt'24, Mureau et al. formally defined the Lattice Isomorphism Problem for module lattices (module-LIP) in a number field $\mathbb{K}$, and proposed a heuristic randomized algorithm solving module-LIP for modules of rank 2 in $\mathbb{K}^2$ with a totally real number field $\mathbb{K}$, which runs in classical polynomial time for a large class of modules and a large class of totally real number field under some reasonable number theoretic assumptions. In this paper, by introducing a (pseudo) symplectic automorphism of the module, we successfully reduce the problem of solving module-LIP over CM number field to the problem of finding certain symplectic automorphism. Furthermore, we show that a weak (pseudo) symplectic automorphism can be computed efficiently, which immediately turns out to be the desired automorphism when the module is in a totally real number field. This directly results in a provable deterministic polynomial-time algorithm solving module-LIP for rank-2 modules in $\mathbb{K}^2$ where $\mathbb{K}$ is a totally real number field, without any assumptions or restrictions on the modules and the totally real number fields. Moreover, the weak symplectic automorphism can also be utilized to invalidate the omSVP assumption employed in HAWK's forgery security analysis, although it does not yield any actual attacks against HAWK itself.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Lattice automorphismmodule-LIPSymplectic matrix
Contact author(s)
luohengyi23 @ mails ucas ac cn
jkj21 @ mails tsinghua edu cn
panyanbin @ amss ac cn
anyuwang @ tsinghua edu cn
History
2024-07-22: approved
2024-07-20: received
See all versions
Short URL
https://ia.cr/2024/1173
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1173,
      author = {Hengyi Luo and Kaijie Jiang and Yanbin Pan and Anyu Wang},
      title = {Cryptanalysis of Rank-2 Module-{LIP} with Symplectic Automorphisms},
      howpublished = {Cryptology ePrint Archive, Paper 2024/1173},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/1173}},
      url = {https://eprint.iacr.org/2024/1173}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.