SALSA: Attacking Lattice Cryptography with Transformers

被引:0
|
作者
Wenger, Emily [1 ,3 ]
Chen, Mingjie [2 ]
Charton, Francois [3 ]
Lauter, Kristin [3 ]
机构
[1] Univ Chicago, Chicago, IL 60637 USA
[2] Univ Birmingham, Birmingham, W Midlands, England
[3] Meta AI, Toronto, ON, Canada
来源
ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 35 (NEURIPS 2022) | 2022年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Currently deployed public-key cryptosystems will be vulnerable to attacks by full-scale quantum computers. Consequently, "quantum resistant" cryptosystems are in high demand, and lattice-based cryptosystems, based on a hard problem known as Learning With Errors (LWE), have emerged as strong contenders for standardization. In this work, we train transformers to perform modular arithmetic and mix half-trained models with statistical cryptanalysis techniques to propose SALSA: a machine learning attack on LWE-based cryptographic schemes. SALSA can fully recover secrets for small-to-mid size LWE instances with sparse binary secrets, and may scale to attack real-world LWE-based cryptosystems.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Attacking and defending masked polynomial comparison for lattice-based cryptography
    Bhasin S.
    D’anvers J.-P.
    Heinz D.
    Pöppelmann T.
    Van Beirendonck M.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (03): : 334 - 359
  • [2] Attacking Compressed Vision Transformers
    Parekh, Swapnil
    Shukla, Pratyush
    Shah, Devansh
    ADVANCES IN INFORMATION AND COMMUNICATION, FICC, VOL 2, 2023, 652 : 743 - 758
  • [3] Decepticon: Attacking Secrets of Transformers
    Al Rafi, Mujahid
    Feng, Yuan
    Yao, Fan
    Tang, Meng
    Jeon, Hyeran
    2023 IEEE INTERNATIONAL SYMPOSIUM ON WORKLOAD CHARACTERIZATION, IISWC, 2023, : 128 - 139
  • [4] Security of quantum cryptography against Trojan horse attacking
    Zeng, Gui-Hua
    Ruan Jian Xue Bao, 1600, 8 (1259-1264):
  • [5] Lattice Cryptography for the Internet
    Peikert, Chris
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 197 - 219
  • [6] Lattice cryptography for the internet
    Peikert, Chris
    Peikert, Chris, 1600, Springer Verlag (8772): : 197 - 219
  • [7] Λολ: Functional Lattice Cryptography
    Crockett, Eric
    Peikert, Chris
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 993 - 1005
  • [8] A Decade of Lattice Cryptography
    Peikert, Chris
    FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2014, 10 (04): : 283 - 424
  • [9] Lattice-based cryptography
    Regev, Oded
    ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 131 - 141
  • [10] Lattice-based Cryptography
    Mohsen, Ayman Wagih
    Bahaa-Eldin, Ayman M.
    Sobh, Mohamed Ali
    2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2017, : 462 - 467