SALSA: Attacking Lattice Cryptography with Transformers

被引:0
作者
Wenger, Emily [1 ,3 ]
Chen, Mingjie [2 ]
Charton, Francois [3 ]
Lauter, Kristin [3 ]
机构
[1] Univ Chicago, Chicago, IL 60637 USA
[2] Univ Birmingham, Birmingham, W Midlands, England
[3] Meta AI, Toronto, ON, Canada
来源
ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 35 (NEURIPS 2022) | 2022年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Currently deployed public-key cryptosystems will be vulnerable to attacks by full-scale quantum computers. Consequently, "quantum resistant" cryptosystems are in high demand, and lattice-based cryptosystems, based on a hard problem known as Learning With Errors (LWE), have emerged as strong contenders for standardization. In this work, we train transformers to perform modular arithmetic and mix half-trained models with statistical cryptanalysis techniques to propose SALSA: a machine learning attack on LWE-based cryptographic schemes. SALSA can fully recover secrets for small-to-mid size LWE instances with sparse binary secrets, and may scale to attack real-world LWE-based cryptosystems.
引用
收藏
页数:14
相关论文
共 50 条
[21]   Symbolic Proofs for Lattice-Based Cryptography [J].
Barthe, Gilles ;
Fan, Xiong ;
Gancher, Joshua ;
Gregoire, Benjamin ;
Jacomme, Charlie ;
Shi, Elaine .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :538-555
[22]   Proof of a Shuffle for Lattice-Based Cryptography [J].
Costa, Nuria ;
Martinez, Ramiro ;
Morillo, Paz .
SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 :280-296
[23]   Recent Advances in Lattice-Based Cryptography [J].
Zhang P. ;
Jiang H. ;
Cai J. ;
Wang C. ;
Zheng Z. ;
Xu Q. .
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2017, 54 (10) :2121-2129
[24]   Post-quantum cryptography: lattice signatures [J].
Buchmann, Johannes ;
Lindner, Richard ;
Rueckert, Markus ;
Schneider, Michael .
COMPUTING, 2009, 85 (1-2) :105-125
[25]   NETWORK SECURITY USING LATTICE BASED CRYPTOGRAPHY [J].
Singhla, Sonal ;
Yadav, Shailja ;
Tanwar, Rohit .
IIOAB JOURNAL, 2019, 10 (02) :66-71
[26]   Exponential sums and lattice reduction: Applications to cryptography [J].
Shparlinski, IE .
FINITE FIELDS WITH APPLICATIONS TO CODING THEORY, CRYPTOGRAPHY AND RELATED AREAS, 2002, :286-298
[27]   Post-quantum cryptography: lattice signatures [J].
Johannes Buchmann ;
Richard Lindner ;
Markus Rückert ;
Michael Schneider .
Computing, 2009, 85 :105-125
[28]   Lattice-Based Cryptography, the Picture Way [J].
Pellet-Mary, Alice .
SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PT I, SCN 2024, 2024, 14973 :XV-XVI
[29]   Error Correction and Ciphertext Quantization in Lattice Cryptography [J].
Micciancio, Daniele ;
Schultz-Wu, Mark .
ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT V, 2023, 14085 :648-681
[30]   Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography [J].
Genise, Nicholas ;
Micciancio, Daniele ;
Peikert, Chris ;
Walter, Michael .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2020, PT I, 2020, 12110 :623-651