Skip to content

malb/oxford-lattice-school-lessons

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

86 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Lessons for Oxford Spring School on Lattice-based Cryptography

Outline

(Outline seemed outdated...)

Lectures & Labs

Lecture 1 (Léo, 60 minutes, Mon)

Signatures from lattices

  • The Hash-then-Sign approach
  • Gaussian Sampling: why (Nguyen-Regev attack) and how
  • The Fiat-Shamir approach

Lecture 2 (Martin, 60 minutes, Wed)

  • [overview/reminder] Finkle-Pohst Enumeration (no pruning …)
  • [overview/reminder] short: BKZ, and quality prediction (root Hermite factor, GSA, …)
  • Mounting simple attacks on SIS (approx-SVP) and LWE (uSVP)
  • Finding the optimal number of sample $m$ is an exercise (see [LinPei])
  • Need to check with Phong what he’ll cover

Lecture 3 (Martin & Léo, 60 minutes, Thu)

Overstreched NTRU

  • Martin: Lattice-subfield attack
  • Léo: Kirchner-Fouque generalization [KF16]

Lab 1: Constructions (Martin+Léo, 120 minutes, Wed)

  • Léo

  • Sage lecture (Martin)

  1. Design and Implementation of LWE Encryption a. Make a script that compute the security level in practice b. Optimise in practice the parameter for the scheme design c. Implement the full scheme: KeyGen, Enc, Dec

  2. (opt) Gaussian Sampling a. Implement the Klein / GPV Gaussian Sampling algorithm
    b. Implement a full signature scheme, using NTRU-type lattice c. Implement FFT GPV Gaussian Sampling algorithm

Lab 2: Attacks (Martin+Léo, 120 minutes, Thu)

  • Martin

  • Fpylll lecture (Martin)

  1. Experimenting with LLL / BKZ: Measure Root-Hermite factors, plot GS norms, check GSA's validity, measure cost Do it for both BKZ and BKZ2. Compare statistics

a. Given a SIS instance, mount the best attack according to the model b. (opt) Improve it using cleverer strategies (e.g. autotuned progressive strategy)

  1. Given an LWE instance, mount the best attack according to the model
  2. (opt) Improve the previous by introducing a pruned enumeration on the whole lattice after BKZ reduction
  3. (opt) Improve the following using more clever strategies
  4. (opt) Get your name up there [https://www.latticechallenge.org/lwe_challenge/challenge.php]

Lecture 4 (Léo, 60 minutes, Fri)

  • Stickelberger Class relation and application to Ideal-SVP

prerequisite : CGS-BS-CDPR attack (Need to check with Dan).

Other

Ali:

Martin, you can assume that people know Python or some other programming languages. If you have a handout with the main Sage commands that you will use, we can distribute it to the students at the beginning of the school so that they can practice them before your session.

You have two sessions so I would suggest the following;

First session; intro to (Lattice-related) Sage, then implementation of one (or more) lattice-based constructions. Additionally, you can give them a homework for the next day, say you ask them to try to implement an attack that has been explained by Léo.

Second session; more on Sage if needed, and solve the homework.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published