Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ISISLattice class #140

Open
psivesely opened this issue Jan 28, 2025 · 0 comments
Open

ISISLattice class #140

psivesely opened this issue Jan 28, 2025 · 0 comments

Comments

@psivesely
Copy link
Contributor

In response to #139 (comment) / proposing an ISISLattice class:

From what I gather from https://eprint.iacr.org/2023/1125.pdf ISIS is broken for bound v >= q sqrt(n/12) and for v \in (q, q sqrt(n/12)) its security is in question. Fixing n, there may be some limit v < q f(q) for secure ISIS parameterization, where f(q) grows inversely in q:

Image

We also explicitly state that we believe the attacks presented in this work are far from optimised. As such, we suggest that appealing to the practical security of ISIS instances with v >= q is approached with great care and, if possible, not at all.

Unless someone intends to implement an estimator for these attacks, an ISISLattice class could print a warning when norm bounds are in this range, citing this paper, but still print out estimates. This would resolve the problem introduced by #139, that some currently secure parameterizations of schemes like Falcon will be claimed trivial when using the SISLattice estimator.

Not my area of expertise, but I believe the best lattice attacks on ISIS compute a basis for the preimage of the target, then find a short vector in that basis. I don't think that target being 0 in SIS has any special affect on the initial preimage/ kernel basis. So even though the black-box reductions I've seen from ISIS to SIS have some minor complications that might affect runtime, for actual attacks it will be the same--is that correct?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant