Attack on Fully Homomorphic Encryption over Principal Ideal Lattice

Slides:



Advertisements
Similar presentations
FULLY HOMOMORPHIC ENCRYPTION
Advertisements

Asymptotically Optimal Communication for Torus- Based Cryptography David Woodruff MIT Joint work with Marten van Dijk Philips/MIT.
Fully Homomorphic Encryption over the Integers
Fearful Symmetry: Can We Solve Ideal Lattice Problems Efficiently?
Cryptographic Multilinear Maps
CSE331: Introduction to Networks and Security Lecture 19 Fall 2002.
Agrawal-Kayal-Saxena Presented by: Xiaosi Zhou
FULLY HOMOMORPHIC ENCRYPTION IBM T. J. Watson Vinod Vaikuntanathan from the Integers Joint Work with M. van Dijk (MIT & RSA labs), C. Gentry (IBM), S.
7. Asymmetric encryption-
1 The RSA Algorithm Supplementary Notes Prepared by Raymond Wong Presented by Raymond Wong.
The RSA Cryptosystem and Factoring Integers (II) Rong-Jaye Chen.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
Oded Regev Tel-Aviv University On Lattices, Learning with Errors, Learning with Errors, Random Linear Codes, Random Linear Codes, and Cryptography and.
1 NTRU: A Ring-Based Public Key Cryptosystem Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman LNCS 1423, 1998.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Cryptanalysis of the Revised NTRU Signature Scheme (NSS) Craig Gentry (DoCoMo) Mike Szydlo (RSA)
Polynomial Factorization Olga Sergeeva Ferien-Akademie 2004, September 19 – October 1.
Homomorphic Encryption: WHAT, WHY, and HOW
ElGamal Public Key Cryptography CS 303 Alg. Number Theory & Cryptography Jeremy Johnson Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme.
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
1 AN EFFICIENT METHOD FOR FACTORING RABIN SCHEME SATTAR J ABOUD 1, 2 MAMOUN S. AL RABABAA and MOHAMMAD A AL-FAYOUMI 1 1 Middle East University for Graduate.
Diophantine Approximation and Basis Reduction
The Polynomial Time Algorithm for Testing Primality George T. Gilbert.
Merkle-Hellman Knapsack Cryptosystem Merkle offered $100 award for breaking singly - iterated knapsack Singly-iterated Merkle - Hellman KC was broken by.
RSA Ramki Thurimella.
Modular Arithmetic with Applications to Cryptography Lecture 47 Section 10.4 Wed, Apr 13, 2005.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Public-key cryptanalysis: lattice attacks Nguyen Dinh Thuc University of Science, HCMC
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
Merkle-Hellman Knapsack Cryptosystem
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
Chapter 9 Public Key Cryptography and RSA. Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender.
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
China Summer School on Lattices and Cryptography Craig Gentry and Shai Halevi June 4, 2014 Homomorphic Encryption over Polynomial Rings.
Copyright 2012, Toshiba Corporation. A Survey on the Algebraic Surface Cryptosystems Koichiro Akiyama ( TOSHIBA Corporation ) Joint work with Prof. Yasuhiro.
China Summer School on Lattices and Cryptography Craig Gentry and Shai Halevi June 3, 2014 Fully Homomorphic Encryption and Bootstrapping.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Packing Techniques for Homomorphic Encryption Schemes Scott Thompson CSCI-762 4/28/2016.
Key Exchange in Systems VPN usually has two phases –Handshake protocol: key exchange between parties sets symmetric keys –Traffic protocol: communication.
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
Lecture 5 Asymmetric Cryptography. Private-Key Cryptography Traditional private/secret/single key cryptography uses one key Shared by both sender and.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-5 Mathematical Background:
Revision. Cryptography depends on some properties of prime numbers. One of these is that it is rather easy to generate large prime numbers, but much harder.
Overview Modern public-key cryptosystems: RSA
Outline Primitive Element Theorem Diffie Hellman Key Distribution
Asymmetric-Key Cryptography
Public Key Encryption.
Public Key Cryptosystem
RSA and El Gamal Cryptosystems
Elliptic Curves.
Knapsack Cryptosystems
The Learning With Errors Problem
Knapsack Cryptosystems
Background: Lattices and the Learning-with-Errors problem
Private-Key Cryptography
GROUPS & THEIR REPRESENTATIONS: a card shuffling approach
Analysis of the RSA Encryption Algorithm
Symmetric-Key Cryptography
Elliptic Curve Cryptography (ECC)
Lattices. Svp & cvp. lll algorithm. application in cryptography
On The Quantitative Hardness of the Closest Vector Problem
CSCE 715: Network Systems Security
CSCI284 Spring 2009 GWU Sections 5.1, 5.2.2, 5.3
Symmetric-Key Cryptography
z , and therefore u =  x ~ /s is an approximation of p z.
Introduction to Cryptography
Oblivious Transfer.
Practical (F)HE Part III – Bootstrapping
Presentation transcript:

Attack on Fully Homomorphic Encryption over Principal Ideal Lattice 1 (1.02) 1 ( ) 2 1 ( ) Gu Chun-sheng1,2 Gu Ji-xing3 b   L   L 1 School of Computer Engineering, Jiangsu Teachers University of Technology, China Changzhou 213001 2 School of Computer Science and Technology, University of Science and Technology of China, China Hefei 230027 3 Institute of Image Communication & Information Processing, Shanghai Jiaotong University, China Shanghai 200240 guchunsheng@gmail.com Abstract. For the fully homomorphic encryption schemes in [3, 6], this paper presents attacks to solve an equivalent secret key and directly recover plaintext from ciphertext for lattice dimensions n=2048 by using lattice reduction algorithm. Suppose the average-case behavior of LLL in [8] is true, then their schemes are also not secure for n=8192. Keywords: Fully Homomorphic Encryption, Cryptanalysis, Principal Ideal Lattice, Lattice Reduction 1 Introduction n Rivest, Adleman and Dertouzos [1] first presented the concept of homomorphic encryption, which has many applications in cryptography. But until 2009, Gentry [2] constructed the first fully homomorphic encryptions based on ideal lattice, all previous schemes are insecure. After the scheme of [2], Smart and Vercauteren [3] presented an optimizating FHE with smaller ciphertext and key by using principal ideal lattice. Dijk, Gentry, Halevi, and Vaikuntanathan [4] proposed a simple fully homomorphic encryption scheme over the integers, whose security depends on the hardness of solving approximate GCD over the integers. Stehle and Steinfeld [5] improved Gentry's fully homomorphic scheme and obtained to a faster fully homomorphic scheme. Similar to [3], Gentry and Halevi [6] implemented Gentry’s scheme by applying principal ideal lattice. The security of FHE’s in [3, 6] depends on the hardness assumption of finding small principal ideal lattice, given its HNF form or two elements form. This paper will present two lattice attacks for FHE’s in [3, 6]. 380 By using block lattice reduction algorithm [7], we solve an equivalent secret key for n=2048 of FHE’s in [3, 6]. Suppose the average case behavior of LLL [8], then the ratio is about , i.e. for n=8192, where 380 is the bit-size of the coefficients in the generator polynomial of [6]. So, our first result shows the FHE’s in [3, 6] are not secure for n=8192. 26

, then one can correctly recover the bit in a ciphertext. 2 Preliminaries w ( x )  C ( x )  p / 2 Let be security parameter, . Let be a ring of integer polynomials modulo , i.e., , where is an irreducible polynomial of degree over the integers. Let denote the polynomial ring over modulo . For , we denote by the infinity norm of , the coefficient vector of , the polynomial of ’s coefficients modulo 2. Theorem 2.1 (Theorem 2.6 [10]) Every block -reduced basis of lattice satisfies , where is another lattice constant using in Schnorr’s algorithm analysis. Theorem 2.2 (Theorem 2, 3 [7]) For all , Schnorr’s constant satisfies: . Asymptotically it satisfies . In particular, (3 k  1)/4 n /(2 k )  1   12 k k  (4 / 3)   2 for all . Theorem 2.3 ([8]). Suppose the average case behavior of LLL is true, then the first vector of LLL is satisfied to on the average for lattice . 3 Attack on Smart-Vercauteren’s FHE Theorem 3.1. Given a principal ideal in either two element or HNF representation, there is a polynomial time algorithm which finds over such that . Proof. Since is a root of over modulo , so . It is easy to verify . Assume . One constructs the following lattice . g 0  - 1  p g 1 g 0 - g 2 g n - 2 g n - 3 1   g n-2 . M  - g 1   0  0 p - 1  g0 0  p   To reduce lattice , one calls the lattice reduction algorithm in [7,10]. By Theorem 2.1, 2.2, one gets such that . Recall that since .■ When , and , . Hence, if , then one can correctly recover the bit in a ciphertext. 27

4 Attack on Gentry-Halevi’s FHE By the decryption algorithm in [6], a ciphertext vector is . Hence, . On the other hand, we have , where is fractional part, and with small vectors and . So, . That is, for any decryptable ciphertext . We apply the same method in Section 3, which finds a small multiple of the secret key . When all the entries of are less than , we may recover the message bit in a ciphertext as follows: if , otherwise . Thus, we finds over with by Theorem 3.1. When , and , we can recover the message bit in a ciphertext by the above method. Furthermore, we can also recover the message bit in a ciphertext for , by Theorem 2.3. Reference R. Rivest, L. Adleman, and M. Dertouzos. On data banks and privacy homomorphisms. In Foundations of Secure Computation, pages 169-180, 1978. C. Gentry. Fully homomorphic encryption using ideal lattices. STOC 2009, pages 169-178. N. P. Smart and Frederik Vercauteren. Fully homomorphic encryption with relatively small key and ciphertext sizes. PKC 2010, LNCS 6056, pages 420-443. M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan. Fully homomorphic encryption over the integers. Eurocrypt 2010, LNCS 6110, pages 24-43. D. Stehle and R. Steinfeld. Faster Fully Homomorphic Encryption. Asiacrypt 2010, LNCS 6477, pages 377-394. C. Gentry and Shai Halevi. Implementing Gentry’s fully-homomorphic encryption scheme. EUROCRYPT 2011, LNCS 6632, pages 129-148. N. Gama, N. Howgrave-Graham, H. Koy, and P. Q. Nguyen. Rankin’s constant and blockwise lattice reduction. CRYPTO 2006, pages 112–130. P. Q. Nguyen and D. Stehle, LLL on the average. ANTS VII, 2006, LNCS 4076, pages 238-256. H. W. Lenstra Jr., A.K. Lenstra and L. Lov´asz, Factoring polynomials with rational coefficients, Mathematische Annalen 261, pages 515-534, 1982. C. P. Schnorr. A hierarchy of polynomial time lattice basis reduction algorithms. Theoretical Computer Science, 53, pages 201-224, 1987. Miklos Ajtai, Ravi Kumar, and D. Sivakumar. A sieve algorithm for the shortest lattice vector problem. STOC 2001, pages 601-610. 28