TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A subfield-logarithm attack against ideal lattices

89 pointsby pedro84over 11 years ago

3 comments

pbsdover 11 years ago
This sort of thing is a recurring theme in cryptography:<p>1. Someone proposes a scheme based on Hard Problem X. X looks strong, but the resulting scheme either is too slow or has gigantic keys.<p>2. Someone else comes along and proposes a related scheme based on Hard Problem Y which, having more structure, allows for either smaller keys or faster computation.<p>3. Later turns out this extra structure also helps the attacker.<p>An example of this phenomena is the McEliece code-based cryptosystem. Many variants based on alternative codes, attempting to reduce the public key size, have been proposed over the years, and very few have survived. Another example is elliptic curves: early on speed was an issue for their practicality, so many weak curves were also proposed that tried to speed things up (one particular example was Koblitz&#x27;s supersingular curve that rendered point doubling into a linear operation).<p>Ideal lattices have exacerbated this phenomena by its applications. Lattices are a key tool in fully homomorphic encryption and friends (multilinear maps, now also obfuscation), and in the frenzy to get these applications into practicality ideal lattices (as opposed to unstructured ones) seem to be the fastest shortcut into better speed and size. It remains to be seen whether they&#x27;ll survive.
评论 #7237866 未加载
yohaover 11 years ago
Bernstein&#x27;s paper are very interesting and contain strong material. He uses an excellent theoretical background but keeps practical considerations in sight. The cryptographic constructions he published are very efficient (e.g. RFSB [1] is way faster than all other code-based hash functions). I should also add that this blog entry is a good illustration of how clear his explanations can be.<p>[1] see [rfsb] in <a href="http://cr.yp.to/codes.html#rfsb" rel="nofollow">http:&#x2F;&#x2F;cr.yp.to&#x2F;codes.html#rfsb</a>
dizietover 11 years ago
For more background on ideal lattice based encryption see <a href="https://www.cs.cmu.edu/~odonnell/hits09/gentry-homomorphic-encryption.pdf" rel="nofollow">https:&#x2F;&#x2F;www.cs.cmu.edu&#x2F;~odonnell&#x2F;hits09&#x2F;gentry-homomorphic-e...</a> (pdf).
评论 #7237177 未加载