Goto

Collaborating Authors

 secret recovery





Supplementary Materials A Further Details of LWE

Neural Information Processing Systems

A.1 Ring Learning with Errors ( 2) We now define RLWE samples and explain how to get LWE instances from them. We give a proof of the search binary-LWE to decisional binary-LWE reduction. Moreover, there are also attacks that do not use lattice reduction. Binary and ternary secret distributions are widely used in homomorphic encryption schemes. Let us now turn to the attacks on (sparse) binary/ternary secrets.



Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors

Stevens, Samuel, Wenger, Emily, Li, Cathy, Nolte, Niklas, Saxena, Eshika, Charton, François, Lauter, Kristin

arXiv.org Artificial Intelligence

Learning with Errors (LWE) is a hard math problem underlying recently standardized post-quantum cryptography (PQC) systems for key exchange and digital signatures. Prior work proposed new machine learning (ML)-based attacks on LWE problems with small, sparse secrets, but these attacks require millions of LWE samples to train on and take days to recover secrets. We propose three key methods -- better preprocessing, angular embeddings and model pre-training -- to improve these attacks, speeding up preprocessing by $25\times$ and improving model sample efficiency by $10\times$. We demonstrate for the first time that pre-training improves and reduces the cost of ML attacks on LWE. Our architecture improvements enable scaling to larger-dimension LWE problems: this work is the first instance of ML attacks recovering sparse binary secrets in dimension $n=1024$, the smallest dimension used in practice for homomorphic encryption applications of LWE where sparse binary secrets are proposed.


SALSA PICANTE: a machine learning attack on LWE with binary secrets

Li, Cathy, Sotáková, Jana, Wenger, Emily, Malhou, Mohamed, Garcelon, Evrard, Charton, Francois, Lauter, Kristin

arXiv.org Artificial Intelligence

Learning with Errors (LWE) is a hard math problem underpinning many proposed post-quantum cryptographic (PQC) systems. The only PQC Key Exchange Mechanism (KEM) standardized by NIST is based on module~LWE, and current publicly available PQ Homomorphic Encryption (HE) libraries are based on ring LWE. The security of LWE-based PQ cryptosystems is critical, but certain implementation choices could weaken them. One such choice is sparse binary secrets, desirable for PQ HE schemes for efficiency reasons. Prior work, SALSA, demonstrated a machine learning-based attack on LWE with sparse binary secrets in small dimensions ($n \le 128$) and low Hamming weights ($h \le 4$). However, this attack assumes access to millions of eavesdropped LWE samples and fails at higher Hamming weights or dimensions. We present PICANTE, an enhanced machine learning attack on LWE with sparse binary secrets, which recovers secrets in much larger dimensions (up to $n=350$) and with larger Hamming weights (roughly $n/10$, and up to $h=60$ for $n=350$). We achieve this dramatic improvement via a novel preprocessing step, which allows us to generate training data from a linear number of eavesdropped LWE samples ($4n$) and changes the distribution of the data to improve transformer training. We also improve the secret recovery methods of SALSA and introduce a novel cross-attention recovery mechanism allowing us to read off the secret directly from the trained models. While PICANTE does not threaten NIST's proposed LWE standards, it demonstrates significant improvement over SALSA and could scale further, highlighting the need for future investigation into machine learning attacks on LWE with sparse binary secrets.


SALSA: Attacking Lattice Cryptography with Transformers

Wenger, Emily, Chen, Mingjie, Charton, François, Lauter, Kristin

arXiv.org Artificial Intelligence

Currently deployed public-key cryptosystems will be vulnerable to attacks by full-scale quantum computers. Consequently, "quantum resistant" cryptosystems are in high demand, and lattice-based cryptosystems, based on a hard problem known as Learning With Errors (LWE), have emerged as strong contenders for standardization. In this work, we train transformers to perform modular arithmetic and combine half-trained models with statistical cryptanalysis techniques to propose SALSA: a machine learning attack on LWE-based cryptographic schemes. SALSA can fully recover secrets for small-to-mid size LWE instances with sparse binary secrets, and may scale to attack real-world LWE-based cryptosystems.