Skip to content

Latest commit

 

History

History
116 lines (81 loc) · 13.1 KB

README.md

File metadata and controls

116 lines (81 loc) · 13.1 KB

Lattice-Based-Cryptography

Understanding and implementation of lattice based cryptography

Abstract

Among different cryptosystems, the public key cryptosystems are of great importance as they can be used in a wide number of applications. However, there has been a lot of progress in the field of quantum computing. Techniques such as RSA, AES are hard to break using classical computation but it could easily be decrypted using quantum computing, putting our data security at risk. Using quantum computing, it may be too easy to decrypt information. Lattice based cryptography could be one of the important cryptography techniques that can be resistant to quantum attacks. NTRU requires low memory. Moreover, it’s keys are short and easily generated. In this paper, we discuss about lattice-based cryptosystem, its implementation (using NTRU) and some applications where lattice-based cryptography could be useful. NTRU key generation, encryption and decryption has been explained.

Introduction

Sensitive data on computer systems is prone to unauthorized access with the advancement in technology, risking the data security of our systems. With the advances in technology and quantum computer generation, threats of cryptanalytic attacks will pose a serious impact on our computer security, thereby making conventional cryptographic schemes obsolete [1]. To prevent these circumstances, we need to improve upon our cryptographic algorithms and security protocols. Our current systems use mathematical problems as their base (for example RSA Algorithm, Diffie Hellman exchange protocol and elliptic curve cryptography).These problems are considered to be unsolvable by conventional computers in polynomial time. However, with the introduction of quantum computation, it is easy to undermine these algorithms (like Rivest–Shamir– Adleman ) which were impossible to decrypt with the conventional computational power, thus risking our information. The advent of quantum computers undermines the security of these current widely used asymmetric algorithms. Shor's algorithm demonstrated that both factoring and discrete logarithm problems are solvable on a quantum computer [2] (Shor’s algorithm was able to factor a given integer ‘N’ into its prime factors in polynomial time). So, scientists have tried to develop methods based on Lattice Based Cryptography which are way more secure, moreover, it would be difficult even for quantum computers to be able to decrypt those Lattice Cryptographic Algorithms. It is expected that classical computing will be replaced by quantum computing which would pose a major threat to the current security protocols in place. To prevent the repercussions of what quantum computers will be able to do in near future, we can use some other similar unsolvable mathematical problems one such problem being Lattice Based asymmetric problem. Forming a Lattice based cryptic algorithm has been a major area of research in post-quantum computing era.

Literature review

Lattice is an infinite arrangement of equidistant points in a vector space. Since it is infinite, and a computer does not have infinite memory, we use basis. A basis vector (usually linearly independent vectors) can be used to form whole Lattice. Lattices having same basis are equivalent.

This is the mathematical description for one such lattice.

image

Figure 1 : Image showing a Lattice

Lattice based cryptography is basically applied on areas where security of our data is of significant importance. This technique is entirely based on the hardness of the problem. We use problems like shortest vector problem, closet vector problem and SIS problems. Some other lattice based problems are mentioned below:

image

The main issue with classical cryptosystems are that the key size is small for these systems. Moreover, there are loopholes in these techniques. Suppose someone transmitting information without the use of OTP, a person with good knowledge of cryptographic techniques could easily have access to the information. With the use of lattice based cryptography, it could be a very difficult task even for quantum computers to have access without the knowledge of the key. Computation speed of lattice based cryptosystems is higher than that of classical cryptosystems. GGH and NTRU are commonly used cryptosystems. While GGH is an asymmetric and based on closest vector problem, NTRU is a cryptosystem that is based on shortest vector problems. Both the problems are of significant difficulty. Lattice based cryptography can be used in digital signatures. Lattice based Cryptography has various applications in our day to day life. Using IOT is at risk due to advancement of quantum computing. It could help the attacker to attack on devices. The security would be a problem. So Lattice based cryptography could be used as it is highly efficient and safe from the quantum computing. We could apply any of the hard problems in the system. But actually finding these hard problems is not easy. Also, more number of keys are required. In order to resolve these issues, Lattice based cryptography could be used. It could be used in several fields where we need to provide efficient and advanced security. It could be used in medical implants and on military grounds, like where and when to hit the target with missile and monitoring the vital signs or the performances of those medical implants, as this information needs advanced security. Although in all these fields, both classic cryptography and lattice based cryptography could be used, lattice based cryptography should be used as these fields require high security levels. Email is one of the least encrypted mode of communication. People generally care less about its encryption as not much confidential information is sent using emails. Lattice based cryptography can be applied on emails in case it is being used for military information sharing or when the matter affects the national security. Although email is not preferred for this type of information sharing. It can also be used in file sharing applications. Since this is the era of electronic payments, the security entirely depends on encryption standards. Frauds during electronic payments would be very less if we use better encryption standards. Hackers won’t be able to gain access to the information. So, Lattice based cartography can be used in electronic payments as well. It can also be used in disk encryption. Disk encryption is basically the process of hiding information from illegitimate users by converting it to unreadable code. A password based authentication is required to access the information on the disk. An anonymous remailer is a service which receives messages with the information about were to forward it but it does not disclose the original sender of the email. It is not possible for the receiver to retrace the original sender of the message. Lattice based cryptography can be used in such scenarios. There can be various other innumerable applications where Lattice Based Cryptography exceeds every other algorithm in terms of reliability and security.

Algorithm

Lattice based cryptography uses general presumed hard to solve lattice problems to set the basis of hardness to crack the cryptosystem’s for example SVP (Shortest Vector Problem), SIVP (Shortest In-dependent Vector Problem), Closest Vector Problem, BDD (Bounded Distance Decoding) etc. Some of the recently used cryptosystems are Ring Learning With Error (R-LWE) and NTRU.

We explored the implementation of NTRUEncrypt(Nth Degree Truncated Polynomial Ring Unit).It is basically a lattice based alternative to conventional crypt algorithms like RSA which uses Shortest Vector Problems in lattice.

Prerequisite: Encryption and decryption is occurring between two parties A and B, presumably A is the sender and B is the receiver. Public parameters taken to explain examples :(N, p, q, d) = (7, 3, 41, 2).

image

NTRU Algorithm:

I. Key Generation

  1. The receiver end (User B) is required to choose 2 random polynomials(small) ,f and g from R where R=Z[X]/(X^N-1) such that inverse of both these polynomials exist and these values must be kept secret.

  2. Compute inverse (f modulo q) and inverse (f modulo p) using properties: 1. f*fq-1 = 1 (modulo q) 2. f*fp-1 = 1 (modulo p)

  3. Compute h=p * ((fq)*g)mod q 1. public key for receiver: h 2. private key for receiver: fg

image Figure 2 : Key Generation

Example to explain key generation for user Bob:

  1. Bob chooses: f (x) = x6−x4+x3+x2−1 and g(x) = x6+x4−x2−x.
  2. Fq(x) = f (x)-1 (mod q) = 8x6 + 26x5 + 31x4+ 21x3 + 40x2 + 2x + 37 (mod 41). Private Key: Fp(x) = f (x)-1 (mod p) = x6 + 2x5 + x3 + x2 +x + 1 (mod 3)
  3. Public key: h(x) = p * (Fq )*g(mod q) = 20x6 + 40x5 + 2x4+ 38x3 + 8x2 + 26x + 30 (mod 41)

II. Encryption

i.	Convert message into a polynomial m  (coefficients  chosen as  modulo p in between –p/2 and p/2 (which is also known as center         lifting).For example, for the cases of NTRU we need a polynomial with coefficients between -1 and 1. We can turn our number into such     a polynomial by changing it into binary (or ternary system) so for example 13 can be represented as 1101 in binary and this becomes       the polynomial 1\*x³+1\*x²+0\*x+1 = x³+x²+1.
ii.	Sender (User A) chooses another random polynomial r.
iii.	Compute the encrypted message e as: e=r*h + m (mod q)

image

Example to explain Encryption of message sent by Alice to Bob:

  1. m(x) = −x5 + x3 + x2 − x + 1 using the ephemeral key r(x) = x6− x5 + x − 1.
  2. e(x) = 31x6+19x5+4x4+2x3+40x2+3x+25 (mod 41) using: e=r*h + m (mod q)

III. Decryption

i. Encrypted message ‘e’ has been received by user B from user A. User B uses his private polynomial f to compute: a= f\*e (mod q)       such that coefficients of a lie in the interval of length of q.
ii. User B computes polynomial b=a (mod p) and reduces each of the coefficients of (a modulo p).
iii. User B uses the private key fp to compute: c=fp\*b (modulo p), which recovers the original message sent by user A

image

Example to explain Decryption of message ‘e’ received by Bob from Alice:

  1. Bob computes a=x6 + 10x5 +33x4 + 40x3 + 40x2 + x + 40 (mod 41) using a= f*e (mod q).
  2. Bob then obtains b = a(mod p) = x6+ 10x5 − 8x4 – x3 – x2+ x − 1 (mod 3).
  3. B reduces a(x) modulo p and computes c = Fp(x)*b(x)= 2x5 + x3 + x2 + 2x + 1 (mod 3).
  4. Centerlifting modulo p result in retrieval of sender's plain text m(x) =−x5 + x3 +x2 − x + 1.

Conclusion

With the predicted advancement in quantum computing, we need to change our cryptography techniques so that we don’t get our data compromised. Lattice based cryptography is one such technique which can be applied. Lattice based cryptography is a complex technique for cryptography.It is emerging as a promising Post Quantum candidate. NTRU is better than others like GGH and LWE as it is more secure. It has been analysed via Shor’s algorithm and it has been proved that NTRU is not susceptible to Shor’s algorithm. However, modification in NTRU can be and should be explored like using multiple private keys. The parameters in NTRU should be taken carefully satisfying various conditions like q>(6d+1)p and f and g being Ternary Polynomials and p and q should be relatively prime with q>p. There are various applications in which Lattice based cryptography could be implemented such as Emails, IOT and electronic payments where we require high end but relatively quick encryption-decryption algorithm.

Result

Hence we were able to implement and understand the working of NTRUEncrypt a lattice based cryptographic system and set up a message communication simulation. Here is an example of the output observed

image

Future Scope

This technology has a medley of applications. NTRUEncrypt is a light, fast, secure and easy to implement system hence the future scope may include its implementation in day to day small tasks like E-mail encryption, IOT device Encryption and electronic payment security since these all require fast encryption decryption algorithm to function.

References

[1] 	S. R. D. Pawan Kumar Pardhan, "Lattice based Cryptography," in Third International Conference on Computing Methodologies and     Communication, 2019.
[2] 	C. Easttom, "An Analysis of Leading Lattice-Based Asymmetric Cryptographic Primitives," in IEEE 9th Annual Computing and     Communication Workshop and Conference, Las Vegas, 2019.