Skip to content

Latest commit

 

History

History
81 lines (55 loc) · 2.88 KB

README.md

File metadata and controls

81 lines (55 loc) · 2.88 KB

Lessons for Oxford Spring School on Lattice-based Cryptography

Outline

(Outline seemed outdated...)

Lectures & Labs

Lecture 1 (Léo, 60 minutes, Mon)

Signatures from lattices

  • The Hash-then-Sign approach
  • Gaussian Sampling: why (Nguyen-Regev attack) and how
  • The Fiat-Shamir approach

Lecture 2 (Martin, 60 minutes, Wed)

  • [overview/reminder] Finkle-Pohst Enumeration (no pruning …)
  • [overview/reminder] short: BKZ, and quality prediction (root Hermite factor, GSA, …)
  • Mounting simple attacks on SIS (approx-SVP) and LWE (uSVP)
  • Finding the optimal number of sample $m$ is an exercise (see [LinPei])
  • Need to check with Phong what he’ll cover

Lecture 3 (Martin & Léo, 60 minutes, Thu)

Overstreched NTRU

  • Martin: Lattice-subfield attack
  • Léo: Kirchner-Fouque generalization [KF16]

Lab 1: Constructions (Martin+Léo, 120 minutes, Wed)

  • Léo

  • Sage lecture (Martin)

  1. Design and Implementation of LWE Encryption a. Make a script that compute the security level in practice b. Optimise in practice the parameter for the scheme design c. Implement the full scheme: KeyGen, Enc, Dec

  2. (opt) Gaussian Sampling a. Implement the Klein / GPV Gaussian Sampling algorithm
    b. Implement a full signature scheme, using NTRU-type lattice c. Implement FFT GPV Gaussian Sampling algorithm

Lab 2: Attacks (Martin+Léo, 120 minutes, Thu)

  • Martin

  • Fpylll lecture (Martin)

  1. Experimenting with LLL / BKZ: Measure Root-Hermite factors, plot GS norms, check GSA's validity, measure cost Do it for both BKZ and BKZ2. Compare statistics

a. Given a SIS instance, mount the best attack according to the model b. (opt) Improve it using cleverer strategies (e.g. autotuned progressive strategy)

  1. Given an LWE instance, mount the best attack according to the model
  2. (opt) Improve the previous by introducing a pruned enumeration on the whole lattice after BKZ reduction
  3. (opt) Improve the following using more clever strategies
  4. (opt) Get your name up there [https://www.latticechallenge.org/lwe_challenge/challenge.php]

Lecture 4 (Léo, 60 minutes, Fri)

  • Stickelberger Class relation and application to Ideal-SVP

prerequisite : CGS-BS-CDPR attack (Need to check with Dan).

Other

Ali:

Martin, you can assume that people know Python or some other programming languages. If you have a handout with the main Sage commands that you will use, we can distribute it to the students at the beginning of the school so that they can practice them before your session.

You have two sessions so I would suggest the following;

First session; intro to (Lattice-related) Sage, then implementation of one (or more) lattice-based constructions. Additionally, you can give them a homework for the next day, say you ask them to try to implement an attack that has been explained by Léo.

Second session; more on Sage if needed, and solve the homework.