Top Banner
Round2: PQ KEM and PKE April 2018 Round2 Team Philips Security Technologies
17

Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Jan 23, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Round2:PQ KEM and PKE

April 2018

Round2 Team

Philips Security Technologies

Page 2: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Philips Security Technologies

Motivation:Different applications, different needs

Application 4

Application 3

Application 2

Application 1Security & trust needs

Performance needs

Application 5

+

+

--

2

Page 3: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Philips Security Technologies

Different applications, different needs

High-speed VPN

Mail

Governmental VPN

Health recordSecurity & trust needs

Performance needs

Note: the applications in this figure are only examples to illustrate that different applications have different security & performance needs.

IoT

+

+

--

3

Page 4: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Philips Security Technologies

Main features

• One unified design to fit all use cases, – Ring and non-ring support.– Round2.KEM and Round.PKE with same building blocks.

• Fine-grained scaling of parameters to any required security level.

• Great bandwidth.

• Great computation speed.

• LWR, well-studied lattice problem.

4

Page 5: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Philips Security Technologies

Main featuresLWR-based

• Builds on LWR problem:

Search LWR: public integers p,q, public matrix 𝐴 ∈ 𝑍𝑞𝑑×𝑑, secret 𝑠 ∈ 𝑍𝑞

𝑑,

public vector 𝑏 =𝑝

𝑞𝐴𝑠 (mod p). Find s.

• Compared with LWE:– Improved bandwidth (𝑝 < 𝑞).– Improved computation.– No noise sampling needed.

5

Page 6: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Philips Security Technologies

Main featuresGeneral LWR (GLWR) unifies LWR and RLWR

• Allows for unified design and implementation:– Ring 𝑅𝑛,𝑞, for 𝑛 = 1, 𝑅𝑛,𝑞 ≡ ℤ𝑞.

• Fits applications with different trust needs (presence/absence of ring structure).

GLWR 𝑝𝑢𝑏𝑙𝑖𝑐 𝑝𝑎𝑟𝑎𝑚𝑒𝑡𝑒𝑟 𝐴 ∈ 𝑅𝑛,𝑞

𝑑𝑛𝑥𝑑𝑛d, q (as before)

n (Ring structure)

6

Page 7: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Philips Security Technologies

Main featuresCommon building blocks for INDCPA and INDCCA security

GLWR

CPA-PKE

CCA-KEM

𝐴 ← 𝑓𝑛𝜏

DEM

Round2.KEM Round2.PKE

Internal building block

Round2.KEM and Round.PKE support applications with different performance/security needs:- Using common building blocks.- Secure email can rely on Round2.PKE (INDCCA).- IPSec VPN can use faster (~2x) Round2.KEM (INDCPA).

7

Page 8: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Philips Security Technologies

Main featuresCommon building blocks for INDCPA and INDCCA security

GLWR

CCA-KEM

𝐴 ← 𝑓𝑛𝜏

DEM

Round2.KEM Round2.PKE

Internal building block

CPA-PKE

• Received official comment on INDCPA proof.

• Easily solvable as indicated by SABER team in their official comment.

• No change to parameters.

8

Page 9: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Philips Security Technologies

Main featuresPrime cyclotomic ring

𝑅𝑛 =𝑥𝑛+1 − 1

𝑥 − 1

• Security– Provable: Known reductions from RLWE and (Ideal) lattice problems.– Practical: Parameters chosen to avoid subrings (and thus, potential attacks).

• Scalable (bandwidth and security level) due to many choices for 𝑛.

𝒏 418 676

Public-key (Bytes) 435 709

Ciphertext (Bytes) 482 868

Failure probability (log2) -81 -65

Best (quantum) attack (bits) 75 139

Best (classical) attack (bits) 79 144

9

Page 10: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Philips Security Technologies

Main featuresGLWR and ring choice lead to great bandwidth performance

• For similar security level (bits), Round2 offers better performance.

• Round2 is scalable: parameters easily configured to offer any requiredsecurity target.

https://bitwiseshiftleft.github.io/estimate-all-the-lwe-ntru-schemes.github.io/graphs

R I N G

N O N – R I N G

10

Page 11: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Philips Security Technologies

Main featuresPower of two moduli 𝑞, 𝑝, 𝑡

• 𝑝, 𝑡: Optimized bandwidth (transmit only 𝑙𝑜𝑔2 𝑝, 𝑙𝑜𝑔2 𝑡 bits).

• 𝑡: Allows to finely tune failure probability (depends on 𝑡).

• 𝑞: Optimized CPU performance in both ring and non-ring settings.

𝑙𝑜𝑔2 𝑡 𝑙𝑜𝑔2 𝑝 𝑙𝑜𝑔2 𝑞 (#bits)

Public parameter 𝐴

Public-key 𝐵 and Ciphertext 𝑈

Ciphertext v

11

Page 12: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Philips Security Technologies

Main featuresGeneration of public parameter: 𝐴 ← 𝑓𝑛

𝜏

Static 𝐴 Dynamic 𝐴 Dynamic 𝐴

Pre-computation attack

CPU (1x)

Permute Permute

Seed Seed Seed Seed

PRNG PRNGPRNGPRNG

Dynamic 𝐴

𝒂𝒎𝒂𝒔𝒕𝒆𝒓: d ≪ lenght ≤ 𝑑2 𝒂𝒎𝒂𝒔𝒕𝒆𝒓: lenght = 𝑑

CPU (11.7x)No unified

CPU (1.4x)Unified

CPU (< 1)Unified

Non-ring Ring

No unifiedPre-computation attack

Pre-computation attack

Pre-computation attack

12

Page 13: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Philips Security Technologies

Main featuresSparse trinary secrets with fixed hamming weight

• Definition depends on 𝑑, and not on 𝑛, to enable unified implementation– Matrix-based multiplication involves always 𝑑 dimensional vectors,

independently of ring or non-ring settings.

• Great performance.

• Low failure probability.

h/2 “-1s” d-h “0s”h/2 “1s”

Usually > 20% 𝑑

𝑑 elements

13

Page 14: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Philips Security Technologies

Main featuresParameter sets

• uRound2: unified implementation for ring and non-ring– Main submission.– One implementation, any set of parameters. 𝑞 power of two. Ring or non-ring. Any security level. Always, great performance.

• nRound2:– Specialized parameter set to support NTT.– Chooses prime 𝑞.

14

Page 15: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Philips Security Technologies

Conclusions & Remarks

• Different applications have different security/performance needs.

• Round2 is an efficient & scalable scheme that fits needs of different applications.

• Lattice-based proposals should be compared based on same methodology to give security estimates.

• Explicit failure probability target required for comparing different proposals.

• Minimal KEM proposal by Mike Hamburg makes lots of sense.

15

Page 16: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Philips Security Technologies

Questions?

16

Page 17: Round2 - NIST–Round2.KEM and Round.PKE with same building blocks. •Fine-grained scaling of parameters to any required security level. •Great bandwidth. •Great computation speed.

Thank you