Dia bom!
No mundo moderno, hÔ cada vez mais declarações sobre a ameaça potencial dos computadores quânticos em relação aos protocolos de criptografia usados. O computador quântico jÔ é capaz de resolver os problemas de logaritmo discreto e fatoração de um número, o que compromete todos os protocolos neles baseados.
Hoje vamos considerar o protocolo NewHope, que se baseia em outra tarefa difĆcil - o problema de aprendizagem com erros em um anel (Ring-LWE).
NewHope ā , , . , SIS, LWE Ring-LWE:
1. SIS
SIS (Short integer solution problem) ā .
, n q ( ):
A:
( ) , .
, ,
. , , .
, z,
. z ( q). , , . , .
? , ( ).
- . z.
, z A .
, , n - .
2. LWE ( Learning with errors)
:
:
n ā ;
q ā , . n, ;
, );
;
k, .
, , s
. ( q):
.
, (LWE on lattices).
:
ā .
, q. .
, , :
:
.
3.
LWE, - SIS:
Public key encryption (LWE):
, . ā .
,
0, 0, 1.
?
.
, , 4 , .
One-way function (SIS):
- -:
, . . (IV).
, ,
.
- (One-way function):
, :
.
-
:
SIS.
? , SIS .
4.
:
.
15 :
2) / , .
?
5. Ring-LWE
.
? , LWE . , n ?
?
ā ,
, n ā .
c q.
? . , , : . .
/? , 2 ,
LWE , , .
6. NewHope
, NewHope , Bos, Castello, Naehrig Stebila. TLS Ring-LWE.
, NewHope.
, .
:
, .
n = 1024, q = 12289 ( ,
). NTT ( ), n ā , q ā , .
a. : seed ā 256 , SHAKE-128 ( SHA3). , 1024 a. : , TLS ( 2 ), NewHope , a. , backdoor , āā .
ā , . - , ( ). seed /dev/urandom 16- . s e.
( b, seed).
a, sā, eā, eā, u.
v, , . .
,
, , . , ā , 0
. , .
. : . q ,
.
( ).
. .
. , , : , 1, , 0. , , . HelpRec, . . , , .
8. Rec 1 4 ( ).
9. 256 , , .
7.
2019 NIST post-quantum crypto project, , . NIST , , KYBER ( Module-LWE) , . 3 KYBER.
, Google Canary CECPQ1 CECPQ2.
:
:
-
https://eprint.iacr.org/2015/1092.pdf
https://eprint.iacr.org/2014/599.pdf
https://www.di.ens.fr/chloe.hebant/presentation/SISproblem.pdf
http://www.ee.cityu.edu.hk/~twhk05/achieve/Wai%20Ho%20Mow.pdf
https://simons.berkeley.edu/talks/lwe-worst-case-average-case-reductions-and-cryptomania
https://simons.berkeley.edu/talks/algebraic-lattices-and-ring-lwe
https://www.ei.ruhr-uni-bochum.de/media/sh/veroeffentlichungen/2013/08/14/lwe_encrypt.pdf
-
https://people.csail.mit.edu/vinodv/6876-Fall2015/L12.pdf
https://security.googleblog.com/2016/07/experimenting-with-post-quantum.html