Kocher: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems

20.02.2018 10:00-11:00

Kocher: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems

20.02.2018, 10:00 – 11:00

Speaker: Nina Bindel, TU Darmstadt, Cryptography and Computer Algebra Group | Location: Mornewegstraße 32 (S4|14), Room 5.3.01, Darmstadt

Organizer: Moritz Horsch, TU Darmstadt


Abstract:

Selecting parameters in lattice-based cryptography is a challenging task, which is essentially accomplished using one of two approaches. The first (very common) approach is to derive parameters assuming that the desired security level is equivalent to the bit hardness of the underlying lattice problem, ignoring the gap implied by available security reductions. The second (barely used) approach takes the gap and thus the security reduction into account. In this work, we investigate how efficient lattice-based schemes are if they respect existing security reductions.

Thus, we present a framework to systematically select parameters for any lattice-based scheme using either approaches. We apply our methodology to the schemes by Lindner and Peikert (LP), by El Bansarkhani (LARA), and by Ducas et al. (BLISS). We analyze their security reductions and derive a gap of 3, 5, and 63 bits, respectively. We show how parameters impact the schemes' efficiency when involving these gaps.

zur Liste