SlideShare a Scribd company logo
1 of 27
Download to read offline
Lattice Based Cryptography 
GGH Cryptosystem 
Tarun Raj - 110050050 
Rama Krishna Banoth - 110050054 
Abhilash Gupta - 110050058 
Vinod Reddy - 110050060 
Varun Janga - 110050076
Quick recap of Linear Algebra and 
Vector Spaces 
❖ A vector space V is a subset of Rn with the 
property that α*v+α*v+..+α*v∈ V: 
1122 mm for a given v, v, ...,v∈ V and all α, α,.., 
12m 12 α∈ R where m<=n. 
m 
❖ Let v = (x1,.., xm) ε V ⊂ Rm then Euclidean 
norm of v is defined as 
||v|| = √(x1 
2 + ..+xm 
2).
What is a Lattice? 
❖ A basis for L is any set of independent vectors that 
generates L. 
❖ The dimension of L is the no. of vectors in a basis for L.
Properties of Lattices 
❖ An Integer lattice is a lattice all of whose vectors have 
integer coordinates. 
❖ Any two basis for a lattice L are related by a matrix having 
integer coordinates and determinant equal to ±1.
Hadamard Ratio 
0<H(B)<1, the closer the value tends to 1 the 
more orthogonal the vectors in the basis. 
0<H(B)≤1, the closer the value tends to 1,the more orthogonal the 
vectors in the basis. 
We use Hadamard ratio to differentiate between a good basis and a 
bad basis.
Good Basis Vs Bad Basis 
❖ Good basis is the one which has nearly orthogonal vectors i.e, having 
hadamard ratio close to 1. 
❖ Bad Basis is the one having hadamard ratio close to 0.
Hard problems on lattices
Hard problems on lattices
Hard problems on lattices 
Note: 
❖ No polynomial-time algorithm is known for 
approximating the CVP in Rn to within a polynomial 
factor of n. 
❖ Best known polynomial time algorithms were based on 
LLL. 
❖ Babai proved that CVP in Rn can be approximated to a 
factor of 2n/2
Babai’s Algorithm
Cryptosystems based on hard Lattice 
Problems 
Some of the initial ones are: 
➔ Ajtai-Dwork Cryptosystem. 
➔ GGH Cryptosystem by Goldreich, Goldwasser, Halevi. 
➔ NTRU cryptosystem by Hoffstein, Pipher and Silverman.
GGH Cryptosystem 
● Based on the problem of finding lattice point 
closest to a given vector.(CVP) 
● Security Parameter - n = dimension of the 
lattice 
● Threshold Parameter - σ = bound on error 
vector 
● Private Key - Good basis of lattice. 
● Public Key - Bad basis of the same lattice
GGH - Cryptosystem
Private Key(R) Generation 
❖ Choosing a random lattice 
➢ R’, an nxn matrix is chosen where elements are 
uniformly taken at random from {-l,...,l}nxn for some 
integer bound l. 
➢ l had no effect on basis so small value is chosen.(±4) 
❖ Choosing an almost rectangular lattice 
➢ Start with k.I and add the “noise” generated above. 
❖ R = R’ + kI 
Experimentally, we get best parameters when k~l√n
Public Key(B) Generation 
❖ R is multiplied by a few random unimodular matrices. 
❖ B = R.T1.T2… 
❖ Each Ti = Li.Ui , where 
➢ Li & Ui are Lower & Upper triangular matrices. 
➢ Each of the diagonal element is ±1 in Li & Ui 
➢ Other non-zero elements can be chosen at random, 
for experiments they chose from {-1,0,1} 
❖ Multiplying R by atleast 4 transformations is required to 
prevent attack using LLL lattice reduction algorithm.
Cryptanalysis - GGH Cryptosystem 
Following are the attacks on GGH cryptosystem 
❖ From the original paper by GGH 
➢ The Round-off Attack 
➢ The Nearest-plane Attack 
➢ The embedding Attack 
❖ From Phong Nguyen which led to the failure 
of this system 
➢ Based on Leaking Remainders
Embedding Attack 
● Embed n basis-vectors and the point c (for 
which we want to find the closest lattice point) 
in an (n+1) dimensional lattice. 
● After embedding, lattice 
reduction algorithms are used to 
find the shortest non-zero vector in L(B’). 
● This heuristic works upto dimensions 110-120.
Nguyen’s Attack 
● Let (n, σ) be as already defined & B be public 
basis. 
● Assume message m ∈ ℤn is encrypted into 
ciphertext c ∈ ℤn with B. 
● There is an error vector e ∈ {±σ}n such that 
c = mB + e
Nguyen’s Attack 
Leaking Remainders: 
c = mB + e 
Consider s = (σ,...,σ) ∈ ℤn, then we have 
e + s ≡ 0 (mod 2σ) 
⇒ c + s ≡ mB (mod 2σ) 
If we can solve the above equation, we get m 
modulo 2σ, denoted by m2σ
Nguyen’s Attack 
Simplifying the CVP: 
Once we get m2σ , observe that m - m2σ= 2σm’ 
for some m’ ∈ ℤn. 
c = mB + e 
⇒ c - m2σB= (m - m2σ)B + e 
⇒ c - m2σB= 2σm’B + e 
⇒
Nguyen’s Attack 
In the above equation, LHS is known. So, the 
new problem reads as a Closest Vector Problem 
(CVP) for which error vector e/2σ ∈ {±½}n. 
Observe that this is simpler CVP for which error 
vectors have entries ±½, thereby traditional 
methods like embedding are more likely to 
work now that error vector is smaller.
Advantages of Lattice Cryptography 
❖ Shor’s algorithm (which runs on a Quantum 
computer) can solve the public key cryptographic 
systems which rely on integer factorization problem or 
the discrete logarithm problem 
❖ Lattice based cryptography provides one of the best 
alternatives for post-quantum cryptographic systems 
❖ Most of lattice based cryptographic constructions are 
believed to be secure against attacks using either 
conventional or quantum computers
Disadvantages of Lattice Cryptography 
❖ NTRU based schemes are practical and efficient to 
implement but lack proof of security 
❖ Theoretical schemes like matrix based learning with 
errors offer strong security proof but use impractically 
large key sizes for general use 
❖ Since current publicly known experimental quantum 
computing is nowhere near powerful to attack real 
cryptographic systems, Lattice based schemes are not 
used much in practice
Recent Developments 
❖ Research has been done on trying to merge NTRU 
family algorithms and LWE (Learning with error) 
schemes 
❖ This class of algorithms are called Learning with errors 
designs over rings, which offer very efficient 
computation, moderate key sizes and strong proof of 
security
References 
❖ An Introduction to Mathematical Cryptography by Jeffrey Hoffstein, 
Jill Pipher, Joseph H. Silverman 
❖ Public-key cryptosystems from lattice reduction problems by Oded 
Goldreich, Shafi Goldwasser, Shai Halevi 
❖ Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from 
Crypto ’97 by Phong Nguyen 
❖ http://www.math.uni-bonn.de/~saxena/courses/WS2010-ref5.pdf 
❖ http://www.di.ens.fr/~lyubash/papers/signaturechess.pdf 
❖ https://www.sav.sk/journals/uploads/0114115305BCKSS.pdf
Thank You
Example:

More Related Content

What's hot

Ford Fulkerson Algorithm
Ford Fulkerson AlgorithmFord Fulkerson Algorithm
Ford Fulkerson AlgorithmAdarsh Rotte
 
Longest Common Subsequence (LCS) Algorithm
Longest Common Subsequence (LCS) AlgorithmLongest Common Subsequence (LCS) Algorithm
Longest Common Subsequence (LCS) AlgorithmDarshit Metaliya
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionGöktuğ Serez
 
The Traveling Salesman Problem
The Traveling Salesman ProblemThe Traveling Salesman Problem
The Traveling Salesman ProblemMaryam Alipour
 
Kernel Bayes Rule
Kernel Bayes RuleKernel Bayes Rule
Kernel Bayes RuleYan Xu
 
Interval Type-2 fuzzy decision making
Interval Type-2 fuzzy decision makingInterval Type-2 fuzzy decision making
Interval Type-2 fuzzy decision makingBob John
 
Introduction to Homomorphic Encryption
Introduction to Homomorphic EncryptionIntroduction to Homomorphic Encryption
Introduction to Homomorphic EncryptionChristoph Matthies
 
Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptographyBarani Tharan
 
Lecture 26 local beam search
Lecture 26 local beam searchLecture 26 local beam search
Lecture 26 local beam searchHema Kashyap
 
Elliptic Curves in Cryptography
Elliptic Curves in CryptographyElliptic Curves in Cryptography
Elliptic Curves in CryptographyCSNP
 
Elliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of mathsElliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of mathsMartijn Grooten
 
Adversarial search
Adversarial searchAdversarial search
Adversarial searchDheerendra k
 
Matrix Completion Presentation
Matrix Completion PresentationMatrix Completion Presentation
Matrix Completion PresentationMichael Hankin
 
2.5 ambiguity in context free grammars
2.5 ambiguity in context free grammars2.5 ambiguity in context free grammars
2.5 ambiguity in context free grammarsSampath Kumar S
 

What's hot (20)

Ford Fulkerson Algorithm
Ford Fulkerson AlgorithmFord Fulkerson Algorithm
Ford Fulkerson Algorithm
 
Longest Common Subsequence (LCS) Algorithm
Longest Common Subsequence (LCS) AlgorithmLongest Common Subsequence (LCS) Algorithm
Longest Common Subsequence (LCS) Algorithm
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
The Traveling Salesman Problem
The Traveling Salesman ProblemThe Traveling Salesman Problem
The Traveling Salesman Problem
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
Kernel Bayes Rule
Kernel Bayes RuleKernel Bayes Rule
Kernel Bayes Rule
 
Interval Type-2 fuzzy decision making
Interval Type-2 fuzzy decision makingInterval Type-2 fuzzy decision making
Interval Type-2 fuzzy decision making
 
Runge Kutta Method
Runge Kutta MethodRunge Kutta Method
Runge Kutta Method
 
Introduction to Homomorphic Encryption
Introduction to Homomorphic EncryptionIntroduction to Homomorphic Encryption
Introduction to Homomorphic Encryption
 
Traveling Salesman Problem
Traveling Salesman Problem Traveling Salesman Problem
Traveling Salesman Problem
 
Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptography
 
Lecture 26 local beam search
Lecture 26 local beam searchLecture 26 local beam search
Lecture 26 local beam search
 
Elliptic Curves in Cryptography
Elliptic Curves in CryptographyElliptic Curves in Cryptography
Elliptic Curves in Cryptography
 
Elliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of mathsElliptic Curve Cryptography for those who are afraid of maths
Elliptic Curve Cryptography for those who are afraid of maths
 
Adversarial search
Adversarial searchAdversarial search
Adversarial search
 
Digital Signature.ppt
Digital Signature.pptDigital Signature.ppt
Digital Signature.ppt
 
Lattice-based Signatures
Lattice-based SignaturesLattice-based Signatures
Lattice-based Signatures
 
Matrix Completion Presentation
Matrix Completion PresentationMatrix Completion Presentation
Matrix Completion Presentation
 
2.5 ambiguity in context free grammars
2.5 ambiguity in context free grammars2.5 ambiguity in context free grammars
2.5 ambiguity in context free grammars
 
Classical cryptography
Classical cryptographyClassical cryptography
Classical cryptography
 

Viewers also liked

Certificate - Azure Fundamentals
Certificate - Azure FundamentalsCertificate - Azure Fundamentals
Certificate - Azure FundamentalsClaude LACHAPELLE
 
City square presentation
City square presentationCity square presentation
City square presentationfishball5
 
Azure licensing (not) so easy - Laurynas Dovydaitis
Azure licensing (not) so easy - Laurynas DovydaitisAzure licensing (not) so easy - Laurynas Dovydaitis
Azure licensing (not) so easy - Laurynas DovydaitisITCamp
 
Software Licensing for SaaS Applications
Software Licensing for SaaS ApplicationsSoftware Licensing for SaaS Applications
Software Licensing for SaaS ApplicationsInishTech
 
ITCamp 2013 - Peter Leeson - Intelligent Evolution
ITCamp 2013 - Peter Leeson - Intelligent EvolutionITCamp 2013 - Peter Leeson - Intelligent Evolution
ITCamp 2013 - Peter Leeson - Intelligent EvolutionITCamp
 
SharePoint Online Collaboration Options
SharePoint Online Collaboration OptionsSharePoint Online Collaboration Options
SharePoint Online Collaboration OptionsRoman Nedzelsky
 
Pricing for profit
Pricing for profitPricing for profit
Pricing for profitAzure Group
 
Federal it transformation plans
Federal it transformation plansFederal it transformation plans
Federal it transformation plansStephen Castellari
 
Automotive Industry Research: An Analysis of the Key Insights from the VFACTS...
Automotive Industry Research: An Analysis of the Key Insights from the VFACTS...Automotive Industry Research: An Analysis of the Key Insights from the VFACTS...
Automotive Industry Research: An Analysis of the Key Insights from the VFACTS...James Organ
 
SharePoint Online v Onprem - presented by Concurrency, Inc
SharePoint Online v Onprem - presented by Concurrency, IncSharePoint Online v Onprem - presented by Concurrency, Inc
SharePoint Online v Onprem - presented by Concurrency, IncConcurrency, Inc.
 
Advanced scientific visualization
Advanced scientific visualizationAdvanced scientific visualization
Advanced scientific visualizationCharles Flynt
 
Azure Cloud Dev Camp - Introduction
Azure Cloud Dev Camp - IntroductionAzure Cloud Dev Camp - Introduction
Azure Cloud Dev Camp - Introductiongiventocode
 
Enterprise Social - SharePoint, Office 365, Lync, Yammer
Enterprise Social - SharePoint, Office 365, Lync, YammerEnterprise Social - SharePoint, Office 365, Lync, Yammer
Enterprise Social - SharePoint, Office 365, Lync, YammerConcurrency, Inc.
 
Introduction to scientific visualization
Introduction to scientific visualizationIntroduction to scientific visualization
Introduction to scientific visualizationOpen Party
 
10 Tips for Better Visualization of Scientific Data
10 Tips for Better Visualization of Scientific Data10 Tips for Better Visualization of Scientific Data
10 Tips for Better Visualization of Scientific DataSercan Ahi
 
Taking Advantage of the SharePoint 2013 REST API
Taking Advantage of the SharePoint 2013 REST APITaking Advantage of the SharePoint 2013 REST API
Taking Advantage of the SharePoint 2013 REST APIEric Shupps
 

Viewers also liked (20)

Certificate - Azure Fundamentals
Certificate - Azure FundamentalsCertificate - Azure Fundamentals
Certificate - Azure Fundamentals
 
Tutorial Brainshark 4
Tutorial Brainshark 4Tutorial Brainshark 4
Tutorial Brainshark 4
 
City square presentation
City square presentationCity square presentation
City square presentation
 
Azure licensing (not) so easy - Laurynas Dovydaitis
Azure licensing (not) so easy - Laurynas DovydaitisAzure licensing (not) so easy - Laurynas Dovydaitis
Azure licensing (not) so easy - Laurynas Dovydaitis
 
Software Licensing for SaaS Applications
Software Licensing for SaaS ApplicationsSoftware Licensing for SaaS Applications
Software Licensing for SaaS Applications
 
ITCamp 2013 - Peter Leeson - Intelligent Evolution
ITCamp 2013 - Peter Leeson - Intelligent EvolutionITCamp 2013 - Peter Leeson - Intelligent Evolution
ITCamp 2013 - Peter Leeson - Intelligent Evolution
 
SharePoint Online Collaboration Options
SharePoint Online Collaboration OptionsSharePoint Online Collaboration Options
SharePoint Online Collaboration Options
 
Fy10 us budget_spending
Fy10 us budget_spendingFy10 us budget_spending
Fy10 us budget_spending
 
Articulo
ArticuloArticulo
Articulo
 
Pricing for profit
Pricing for profitPricing for profit
Pricing for profit
 
Federal it transformation plans
Federal it transformation plansFederal it transformation plans
Federal it transformation plans
 
Drp
DrpDrp
Drp
 
Automotive Industry Research: An Analysis of the Key Insights from the VFACTS...
Automotive Industry Research: An Analysis of the Key Insights from the VFACTS...Automotive Industry Research: An Analysis of the Key Insights from the VFACTS...
Automotive Industry Research: An Analysis of the Key Insights from the VFACTS...
 
SharePoint Online v Onprem - presented by Concurrency, Inc
SharePoint Online v Onprem - presented by Concurrency, IncSharePoint Online v Onprem - presented by Concurrency, Inc
SharePoint Online v Onprem - presented by Concurrency, Inc
 
Advanced scientific visualization
Advanced scientific visualizationAdvanced scientific visualization
Advanced scientific visualization
 
Azure Cloud Dev Camp - Introduction
Azure Cloud Dev Camp - IntroductionAzure Cloud Dev Camp - Introduction
Azure Cloud Dev Camp - Introduction
 
Enterprise Social - SharePoint, Office 365, Lync, Yammer
Enterprise Social - SharePoint, Office 365, Lync, YammerEnterprise Social - SharePoint, Office 365, Lync, Yammer
Enterprise Social - SharePoint, Office 365, Lync, Yammer
 
Introduction to scientific visualization
Introduction to scientific visualizationIntroduction to scientific visualization
Introduction to scientific visualization
 
10 Tips for Better Visualization of Scientific Data
10 Tips for Better Visualization of Scientific Data10 Tips for Better Visualization of Scientific Data
10 Tips for Better Visualization of Scientific Data
 
Taking Advantage of the SharePoint 2013 REST API
Taking Advantage of the SharePoint 2013 REST APITaking Advantage of the SharePoint 2013 REST API
Taking Advantage of the SharePoint 2013 REST API
 

Similar to Lattice Based Cryptography - GGH Cryptosystem

Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...decentralizeeverything
 
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSBLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSIJNSA Journal
 
Cheatsheet recurrent-neural-networks
Cheatsheet recurrent-neural-networksCheatsheet recurrent-neural-networks
Cheatsheet recurrent-neural-networksSteve Nouri
 
Chapter 06 rsa cryptosystem
Chapter 06   rsa cryptosystemChapter 06   rsa cryptosystem
Chapter 06 rsa cryptosystemAnkur Choudhary
 
Lightweight Neighborhood Cardinality Estimation in Dynamic Wireless Networks ...
Lightweight Neighborhood Cardinality Estimation in Dynamic Wireless Networks ...Lightweight Neighborhood Cardinality Estimation in Dynamic Wireless Networks ...
Lightweight Neighborhood Cardinality Estimation in Dynamic Wireless Networks ...Marco Cattani
 
AbstractRSA cryptosystem was first discovered in 1977 by Adi Shi.docx
AbstractRSA cryptosystem was first discovered in 1977 by Adi Shi.docxAbstractRSA cryptosystem was first discovered in 1977 by Adi Shi.docx
AbstractRSA cryptosystem was first discovered in 1977 by Adi Shi.docxransayo
 
Timing attacks - Rambus
Timing attacks - RambusTiming attacks - Rambus
Timing attacks - RambusRambus
 
NIPS2007: structured prediction
NIPS2007: structured predictionNIPS2007: structured prediction
NIPS2007: structured predictionzukun
 
Manifold Blurring Mean Shift algorithms for manifold denoising, presentation,...
Manifold Blurring Mean Shift algorithms for manifold denoising, presentation,...Manifold Blurring Mean Shift algorithms for manifold denoising, presentation,...
Manifold Blurring Mean Shift algorithms for manifold denoising, presentation,...Florent Renucci
 
CSP UNIT 2 AIML.ppt
CSP UNIT 2 AIML.pptCSP UNIT 2 AIML.ppt
CSP UNIT 2 AIML.pptssuser6e2b26
 
A note on word embedding
A note on word embeddingA note on word embedding
A note on word embeddingKhang Pham
 

Similar to Lattice Based Cryptography - GGH Cryptosystem (20)

Ch9
Ch9Ch9
Ch9
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
 
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSBLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
 
Cheatsheet recurrent-neural-networks
Cheatsheet recurrent-neural-networksCheatsheet recurrent-neural-networks
Cheatsheet recurrent-neural-networks
 
Lect6 csp
Lect6 cspLect6 csp
Lect6 csp
 
Approx
ApproxApprox
Approx
 
Computer Network Assignment Help
Computer Network Assignment HelpComputer Network Assignment Help
Computer Network Assignment Help
 
Chapter 06 rsa cryptosystem
Chapter 06   rsa cryptosystemChapter 06   rsa cryptosystem
Chapter 06 rsa cryptosystem
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Lightweight Neighborhood Cardinality Estimation in Dynamic Wireless Networks ...
Lightweight Neighborhood Cardinality Estimation in Dynamic Wireless Networks ...Lightweight Neighborhood Cardinality Estimation in Dynamic Wireless Networks ...
Lightweight Neighborhood Cardinality Estimation in Dynamic Wireless Networks ...
 
AbstractRSA cryptosystem was first discovered in 1977 by Adi Shi.docx
AbstractRSA cryptosystem was first discovered in 1977 by Adi Shi.docxAbstractRSA cryptosystem was first discovered in 1977 by Adi Shi.docx
AbstractRSA cryptosystem was first discovered in 1977 by Adi Shi.docx
 
Timing attacks - Rambus
Timing attacks - RambusTiming attacks - Rambus
Timing attacks - Rambus
 
CH6,7.pptx
CH6,7.pptxCH6,7.pptx
CH6,7.pptx
 
NIPS2007: structured prediction
NIPS2007: structured predictionNIPS2007: structured prediction
NIPS2007: structured prediction
 
Cdc18 dg lee
Cdc18 dg leeCdc18 dg lee
Cdc18 dg lee
 
Manifold Blurring Mean Shift algorithms for manifold denoising, presentation,...
Manifold Blurring Mean Shift algorithms for manifold denoising, presentation,...Manifold Blurring Mean Shift algorithms for manifold denoising, presentation,...
Manifold Blurring Mean Shift algorithms for manifold denoising, presentation,...
 
CSP UNIT 2 AIML.ppt
CSP UNIT 2 AIML.pptCSP UNIT 2 AIML.ppt
CSP UNIT 2 AIML.ppt
 
A note on word embedding
A note on word embeddingA note on word embedding
A note on word embedding
 
Rsa
RsaRsa
Rsa
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Lattice Based Cryptography - GGH Cryptosystem

  • 1. Lattice Based Cryptography GGH Cryptosystem Tarun Raj - 110050050 Rama Krishna Banoth - 110050054 Abhilash Gupta - 110050058 Vinod Reddy - 110050060 Varun Janga - 110050076
  • 2. Quick recap of Linear Algebra and Vector Spaces ❖ A vector space V is a subset of Rn with the property that α*v+α*v+..+α*v∈ V: 1122 mm for a given v, v, ...,v∈ V and all α, α,.., 12m 12 α∈ R where m<=n. m ❖ Let v = (x1,.., xm) ε V ⊂ Rm then Euclidean norm of v is defined as ||v|| = √(x1 2 + ..+xm 2).
  • 3. What is a Lattice? ❖ A basis for L is any set of independent vectors that generates L. ❖ The dimension of L is the no. of vectors in a basis for L.
  • 4. Properties of Lattices ❖ An Integer lattice is a lattice all of whose vectors have integer coordinates. ❖ Any two basis for a lattice L are related by a matrix having integer coordinates and determinant equal to ±1.
  • 5. Hadamard Ratio 0<H(B)<1, the closer the value tends to 1 the more orthogonal the vectors in the basis. 0<H(B)≤1, the closer the value tends to 1,the more orthogonal the vectors in the basis. We use Hadamard ratio to differentiate between a good basis and a bad basis.
  • 6. Good Basis Vs Bad Basis ❖ Good basis is the one which has nearly orthogonal vectors i.e, having hadamard ratio close to 1. ❖ Bad Basis is the one having hadamard ratio close to 0.
  • 7. Hard problems on lattices
  • 8. Hard problems on lattices
  • 9. Hard problems on lattices Note: ❖ No polynomial-time algorithm is known for approximating the CVP in Rn to within a polynomial factor of n. ❖ Best known polynomial time algorithms were based on LLL. ❖ Babai proved that CVP in Rn can be approximated to a factor of 2n/2
  • 11. Cryptosystems based on hard Lattice Problems Some of the initial ones are: ➔ Ajtai-Dwork Cryptosystem. ➔ GGH Cryptosystem by Goldreich, Goldwasser, Halevi. ➔ NTRU cryptosystem by Hoffstein, Pipher and Silverman.
  • 12. GGH Cryptosystem ● Based on the problem of finding lattice point closest to a given vector.(CVP) ● Security Parameter - n = dimension of the lattice ● Threshold Parameter - σ = bound on error vector ● Private Key - Good basis of lattice. ● Public Key - Bad basis of the same lattice
  • 14. Private Key(R) Generation ❖ Choosing a random lattice ➢ R’, an nxn matrix is chosen where elements are uniformly taken at random from {-l,...,l}nxn for some integer bound l. ➢ l had no effect on basis so small value is chosen.(±4) ❖ Choosing an almost rectangular lattice ➢ Start with k.I and add the “noise” generated above. ❖ R = R’ + kI Experimentally, we get best parameters when k~l√n
  • 15. Public Key(B) Generation ❖ R is multiplied by a few random unimodular matrices. ❖ B = R.T1.T2… ❖ Each Ti = Li.Ui , where ➢ Li & Ui are Lower & Upper triangular matrices. ➢ Each of the diagonal element is ±1 in Li & Ui ➢ Other non-zero elements can be chosen at random, for experiments they chose from {-1,0,1} ❖ Multiplying R by atleast 4 transformations is required to prevent attack using LLL lattice reduction algorithm.
  • 16. Cryptanalysis - GGH Cryptosystem Following are the attacks on GGH cryptosystem ❖ From the original paper by GGH ➢ The Round-off Attack ➢ The Nearest-plane Attack ➢ The embedding Attack ❖ From Phong Nguyen which led to the failure of this system ➢ Based on Leaking Remainders
  • 17. Embedding Attack ● Embed n basis-vectors and the point c (for which we want to find the closest lattice point) in an (n+1) dimensional lattice. ● After embedding, lattice reduction algorithms are used to find the shortest non-zero vector in L(B’). ● This heuristic works upto dimensions 110-120.
  • 18. Nguyen’s Attack ● Let (n, σ) be as already defined & B be public basis. ● Assume message m ∈ ℤn is encrypted into ciphertext c ∈ ℤn with B. ● There is an error vector e ∈ {±σ}n such that c = mB + e
  • 19. Nguyen’s Attack Leaking Remainders: c = mB + e Consider s = (σ,...,σ) ∈ ℤn, then we have e + s ≡ 0 (mod 2σ) ⇒ c + s ≡ mB (mod 2σ) If we can solve the above equation, we get m modulo 2σ, denoted by m2σ
  • 20. Nguyen’s Attack Simplifying the CVP: Once we get m2σ , observe that m - m2σ= 2σm’ for some m’ ∈ ℤn. c = mB + e ⇒ c - m2σB= (m - m2σ)B + e ⇒ c - m2σB= 2σm’B + e ⇒
  • 21. Nguyen’s Attack In the above equation, LHS is known. So, the new problem reads as a Closest Vector Problem (CVP) for which error vector e/2σ ∈ {±½}n. Observe that this is simpler CVP for which error vectors have entries ±½, thereby traditional methods like embedding are more likely to work now that error vector is smaller.
  • 22. Advantages of Lattice Cryptography ❖ Shor’s algorithm (which runs on a Quantum computer) can solve the public key cryptographic systems which rely on integer factorization problem or the discrete logarithm problem ❖ Lattice based cryptography provides one of the best alternatives for post-quantum cryptographic systems ❖ Most of lattice based cryptographic constructions are believed to be secure against attacks using either conventional or quantum computers
  • 23. Disadvantages of Lattice Cryptography ❖ NTRU based schemes are practical and efficient to implement but lack proof of security ❖ Theoretical schemes like matrix based learning with errors offer strong security proof but use impractically large key sizes for general use ❖ Since current publicly known experimental quantum computing is nowhere near powerful to attack real cryptographic systems, Lattice based schemes are not used much in practice
  • 24. Recent Developments ❖ Research has been done on trying to merge NTRU family algorithms and LWE (Learning with error) schemes ❖ This class of algorithms are called Learning with errors designs over rings, which offer very efficient computation, moderate key sizes and strong proof of security
  • 25. References ❖ An Introduction to Mathematical Cryptography by Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman ❖ Public-key cryptosystems from lattice reduction problems by Oded Goldreich, Shafi Goldwasser, Shai Halevi ❖ Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto ’97 by Phong Nguyen ❖ http://www.math.uni-bonn.de/~saxena/courses/WS2010-ref5.pdf ❖ http://www.di.ens.fr/~lyubash/papers/signaturechess.pdf ❖ https://www.sav.sk/journals/uploads/0114115305BCKSS.pdf