SALSA: Attacking Lattice Cryptography with Transformers

被引:0
作者
Wenger, Emily [1 ,3 ]
Chen, Mingjie [2 ]
Charton, Francois [3 ]
Lauter, Kristin [3 ]
机构
[1] Univ Chicago, Chicago, IL 60637 USA
[2] Univ Birmingham, Birmingham, W Midlands, England
[3] Meta AI, Toronto, ON, Canada
来源
ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 35 (NEURIPS 2022) | 2022年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Currently deployed public-key cryptosystems will be vulnerable to attacks by full-scale quantum computers. Consequently, "quantum resistant" cryptosystems are in high demand, and lattice-based cryptosystems, based on a hard problem known as Learning With Errors (LWE), have emerged as strong contenders for standardization. In this work, we train transformers to perform modular arithmetic and mix half-trained models with statistical cryptanalysis techniques to propose SALSA: a machine learning attack on LWE-based cryptographic schemes. SALSA can fully recover secrets for small-to-mid size LWE instances with sparse binary secrets, and may scale to attack real-world LWE-based cryptosystems.
引用
收藏
页数:14
相关论文
共 50 条
[31]   Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography [J].
Genise, Nicholas ;
Micciancio, Daniele ;
Peikert, Chris ;
Walter, Michael .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2020, PT I, 2020, 12110 :623-651
[32]   Efficient implementation of ideal lattice-based cryptography [J].
Pöppelmann T. .
IT - Information Technology, 2017, 59 (06) :305-309
[33]   Improved Plantard Arithmetic for Lattice-based Cryptography [J].
Huang J. ;
Zhang J. ;
Zhao H. ;
Liu Z. ;
Cheung R.C.C. ;
Koç Ç.K. ;
Chen D. .
IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (04) :614-636
[34]   Improvement of Lattice-Based Cryptography Using CRT [J].
Plantard, Thomas ;
Rose, Mike ;
Susilo, Willy .
QUANTUM COMMUNICATION AND QUANTUM NETWORKING, 2010, 36 :275-282
[35]   Preface to special topic on lattice-based cryptography [J].
Yu, Yu .
NATIONAL SCIENCE REVIEW, 2021, 8 (09)
[36]   Power Analysis Attacks for Lattice-Based Cryptography [J].
Li Y.-B. ;
Zhu J.-J. ;
Tang M. ;
Zhang H.-G. .
Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (02) :331-352
[37]   Preface to special topic on lattice-based cryptography [J].
Yu Yu .
National Science Review, 2021, 8 (09) :6-6
[38]   Post-quantum cryptography: lattice identification schemes [J].
Silva, Rosemberg ;
Cayrel, Pierre-Louis ;
Buchmann, Johannes .
PUBLICATIONES MATHEMATICAE-DEBRECEN, 2011, 79 (3-4) :729-748
[39]   A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography [J].
Deng, Jiaxin ;
Chen, Simin ;
Chen, Jiageng ;
Meng, Weizhi .
EMERGING INFORMATION SECURITY AND APPLICATIONS, EISA 2022, 2022, 1641 :87-107
[40]   Bounds on quantum evolution complexity via lattice cryptography [J].
Craps, Ben ;
De Clerck, Marine ;
Evnin, Oleg ;
Hacker, Philip ;
Pavlov, Maxim .
SCIPOST PHYSICS, 2022, 13 (04)