lpn problem
Recently Published Documents


TOTAL DOCUMENTS

16
(FIVE YEARS 5)

H-INDEX

3
(FIVE YEARS 0)

Author(s):  
Davide Bellizia ◽  
Clément Hoffmann ◽  
Dina Kamel ◽  
Hanlin Liu ◽  
Pierrick Méaux ◽  
...  

Hard learning problems are important building blocks for the design of various cryptographic functionalities such as authentication protocols and post-quantum public key encryption. The standard implementations of such schemes add some controlled errors to simple (e.g., inner product) computations involving a public challenge and a secret key. Hard physical learning problems formalize the potential gains that could be obtained by leveraging inexact computing to directly generate erroneous samples. While they have good potential for improving the performances and physical security of more conventional samplers when implemented in specialized integrated circuits, it remains unknown whether physical defaults that inevitably occur in their instantiation can lead to security losses, nor whether their implementation can be viable on standard platforms such as FPGAs. We contribute to these questions in the context of the Learning Parity with Physical Noise (LPPN) problem by: (1) exhibiting new (output) data dependencies of the error probabilities that LPPN samples may suffer from; (2) formally showing that LPPN instances with such dependencies are as hard as the standard LPN problem; (3) analyzing an FPGA prototype of LPPN processor that satisfies basic security and performance requirements.


Mathematics ◽  
2021 ◽  
Vol 9 (5) ◽  
pp. 573
Author(s):  
Siniša Tomović ◽  
Milica Knežević ◽  
Miodrag J. Mihaljević

This paper reconsiders a powerful man-in-the-middle attack against Random-HB# and HB# authentication protocols, two prominent representatives of the HB family of protocols, which are built based on the Learning Parity in Noise (LPN) problem. A recent empirical report pointed out that the attack does not meet the claimed precision and complexity. Performing a thorough theoretical and numerical re-evaluation of the attack, in this paper we identify the root cause of the detected problem, which lies in reasoning based on approximate probability distributions of the central attack events, that can not provide the required precision due to the inherent limitations in the use of the Central Limit Theorem for this particular application. We rectify the attack by employing adequate Bayesian reasoning, after establishing the exact distributions of these events, and overcome the mentioned limitations. We further experimentally confirm the correctness of the rectified attack and show that it satisfies the required, targeted accuracy and efficiency, unlike the original attack.


2019 ◽  
Vol 33 (1) ◽  
pp. 1-33
Author(s):  
Qian Guo ◽  
Thomas Johansson ◽  
Carl Löndahl

Abstract We present a new algorithm for solving the LPN problem. The algorithm has a similar form as some previous methods, but includes a new key step that makes use of approximations of random words to a nearest codeword in a linear code. It outperforms previous methods for many parameter choices. In particular, we can now solve the $$(512,\frac{1}{8})$$(512,18) LPN instance with complexity less than $$2^{80}$$280 operations in expectation, indicating that cryptographic schemes like HB variants and LPN-C should increase their parameter size for 80-bit security.


Author(s):  
Антон Миколайович Олексійчук ◽  
Сергій Михайлович Ігнатенко

2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
Siniša Tomović ◽  
Miodrag J. Mihaljević ◽  
Aleksandar Perović ◽  
Zoran Ognjanović

The problem of developing authentication protocols dedicated to a specific scenario where an entity with limited computational capabilities should prove the identity to a computationally powerful Verifier is addressed. An authentication protocol suitable for the considered scenario which jointly employs the learning parity with noise (LPN) problem and a paradigm of random selection is proposed. It is shown that the proposed protocol is secure against active attacking scenarios and so called GRS man-in-the-middle (MIM) attacking scenarios. In comparison with the related previously reported authentication protocols the proposed one provides reduction of the implementation complexity and at least the same level of the cryptographic security.


2014 ◽  
Vol 40 (5-6) ◽  
pp. 100-112 ◽  
Author(s):  
Ivan Teixidó ◽  
Francesc Sebé ◽  
Josep Conde ◽  
Francesc Solsona
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document