Description
The security of cryptographic systems such as Kyber and Dilithium (currently undergoing standardization by NIST) fundamentally hinges on the Learning With Errors (LWE) problem. However, the state of the art for attacking this problem is not yet entirely clear. Specifically, the validity of dual attacks on LWE is currently under scrutiny due to their analyses relying on heuristics that have proven to be inaccurate. Notably, an assumption of independence introduces an error in the counting of false positives. Nevertheless, there is hope for dual attacks. It is feasible to rectify their analyses to accurately account for false positives, demonstrating that their impact on attack complexity is negligible.
Next sessions
-
Schéma de signature à clé publique : Frobénius-UOV
Speaker : Gilles Macario-Rat - Orange
L'exposé présente un schéma de signature à clé publique post-quantique inspiré du schéma UOV et introduisant un nouvel outil : les formes de Frobénius. L'accent est mis sur le rôle et les propriétés des formes de Frobénius dans ce nouveau schéma : la simplicité de description, la facilité de mise en oeuvre et le gain inédit sur les tailles de signature et de clé qui bat RSA-2048 au niveau de[…] -
Cryptanalysis of full BEANIE
Speaker : Xavier Bonnetain - Inria
BEANIE is a tweakable block cipher recently published at ToSC aiming for memory encryption of microcontroller units. In line with this goal, it handles small plaintexts of only 32 bits and has a low latency. In this paper, we propose the first third-party analysis of the two variants of BEANIE. By carefully leveraging structural properties of the cipher and taking advantage of its distinctive[…]-
Cryptography
-
Symmetrical primitive
-