• Aucun résultat trouvé

Ulaanbaatar (Mongolia) School of Mathematic and Computer Science, National University of Mongolia.

N/A
N/A
Protected

Academic year: 2022

Partager "Ulaanbaatar (Mongolia) School of Mathematic and Computer Science, National University of Mongolia."

Copied!
49
0
0

Texte intégral

(1)

September 14-20, 2015

Ulaanbaatar (Mongolia)

School of Mathematic and Computer Science, National University of Mongolia.

Lattice Cryptography

Michel Waldschmidt

Institut de Math´ematiques de Jussieu — Paris VI http://webusers.imj-prg.fr/~michel.waldschmidt/

(2)

SEAMS School 2015

”Number Theory and Applications in Cryptography and Coding Theory”

University of Science, Ho Chi Minh, Vietnam August 31 - September 08, 2015

Course on Lattices and Applicationsby Dung Duong, University of Bielefeld, Khuong A. Nguyen, HCMUT, VNU-HCM Ha Tran, Aalto University

Slides :

http://www.math.uni-bielefeld.de/~dhoang/seams15/

(3)

CIMPA-ICTP School 2016

Lattices and application to cryptography and coding theory

CIMPA-ICTP-VIETNAM

Research School co-sponsored with ICTP Ho Chi Minh, August 1-12, 2016

http://www.cimpa-icpam.org/

http://ricerca.mat.uniroma3.it/users/valerio/hochiminh16.html

Applications :http://students.cimpa.info/login

(4)

Main references

Jeffrey Hoffstein, Jill Pipher and Joseph H. Silverman : An introduction to mathematical cryptography. Springer

Undergraduate Texts in Mathematics, 2008. Second ed. 2014.

Wade Trappe and Lawrence C. Washington : Introduction to Cryptography with Coding Theory. Pearson Prentice Hall, 2006.

http://en.bookfi.org/book/1470907

(5)

Further references

A. K. Lenstra, H. W. Lenstra, Jr., and L. Lovacz :Factoring Polynomials with Rational Coefficients. Math Annalen261 (1982) 515–534.

Daniele Micciancio & Oded Regev : Lattice-based Cryptography(2008).

http://www.cims.nyu.edu/~regev/papers/pqc.pdf

Joachim von zur Gathen & J¨urgen Gerhard.Modern Computer Algebra. Cambridge University Press, Cambridge, UK, Third edition (2013).

https://cosec.bit.uni-bonn.de/science/mca/

Abderrahmane Nitaj : Applications de l’algorithme LLL en cryptographie. Informal notes.

http://math.unicaen.fr/~nitaj/LLLapplic.pdf

(6)

Subgroups of Rn

Examples

Finitely generated or not, finite rank or not

discrete or not, dense or not, closed or not

Classification of closed subgroups of R

Classification of closed subgroups of R2, ofRn

(7)

Subgroups of Rn

Examples

Finitely generated or not, finite rank or not

discrete or not, dense or not, closed or not

Classification of closed subgroups of R

Classification of closed subgroups of R2, ofRn

(8)

Subgroups of Rn

Examples

Finitely generated or not, finite rank or not

discrete or not, dense or not, closed or not

Classification of closed subgroups of R

Classification of closed subgroups of R2, ofRn

(9)

Subgroups of Rn

Examples

Finitely generated or not, finite rank or not

discrete or not, dense or not, closed or not

Classification of closed subgroups of R

Classification of closed subgroups of R2, ofRn

(10)

Subgroups of Rn

Examples

Finitely generated or not, finite rank or not

discrete or not, dense or not, closed or not

Classification of closed subgroups of R

Classification of closed subgroups of R2, ofRn

(11)

Quotient of Rn by a discrete subgroup

Additive group : C Multiplicative group :C×

R/Z 'U R−→U t7−→e2iπt C/Z'C× C−→C× z 7−→e2iπz

Elliptic curve : C/L L=1+2 lattice in C'R2 Abelian variety :Cg/L L lattice inCg 'R2g

Commutative algebraic groups over C.

(12)

Quotient of Rn by a discrete subgroup

Additive group : C Multiplicative group :C×

R/Z 'U R−→U t7−→e2iπt C/Z'C× C−→C× z 7−→e2iπz

Elliptic curve : C/L L=1+2 lattice in C'R2 Abelian variety :Cg/L L lattice inCg 'R2g

Commutative algebraic groups over C.

(13)

Quotient of Rn by a discrete subgroup

Additive group : C Multiplicative group :C×

R/Z 'U R−→U t7−→e2iπt C/Z'C× C−→C× z 7−→e2iπz

Elliptic curve : C/L L=1+2 lattice in C'R2 Abelian variety :Cg/L L lattice inCg 'R2g

Commutative algebraic groups over C.

(14)

Quotient of Rn by a discrete subgroup

Additive group : C Multiplicative group :C×

R/Z 'U R−→U t7−→e2iπt C/Z'C× C−→C× z 7−→e2iπz

Elliptic curve : C/L L=1+2 lattice in C'R2 Abelian variety :Cg/L L lattice inCg 'R2g

Commutative algebraic groups over C.

(15)

Quotient of Rn by a discrete subgroup

Additive group : C Multiplicative group :C×

R/Z 'U R−→U t7−→e2iπt C/Z'C× C−→C× z 7−→e2iπz

Elliptic curve : C/L L=1+2 lattice in C'R2 Abelian variety :Cg/L L lattice inCg 'R2g

Commutative algebraic groups over C.

(16)

Quotient of Rn by a discrete subgroup

Additive group : C Multiplicative group :C×

R/Z 'U R−→U t7−→e2iπt C/Z'C× C−→C× z 7−→e2iπz

Elliptic curve : C/L L=1+2 lattice in C'R2 Abelian variety :Cg/L L lattice inCg 'R2g

Commutative algebraic groups over C.

(17)

Quotient of Rn by a discrete subgroup

Additive group : C Multiplicative group :C×

R/Z 'U R−→U t7−→e2iπt C/Z'C× C−→C× z 7−→e2iπz

Elliptic curve : C/L L=1+2 lattice in C'R2 Abelian variety :Cg/L L lattice inCg 'R2g

Commutative algebraic groups over C.

(18)

Some acronymes

DES : Data Encryption Standard (1977) AES : Advanced Encryption Standard (2000) RSA : Rivest, Shamir, Adelman (1978) LLL : Lenstra, Lenstra, Lovacz (1982)

SVP : Shortest Vector Problem (and approximate versions) CVP : Closest Vector Problem (and approximate versions) SBP : Shortest Basis Problem (and approximate versions)

(19)

Some acronymes

DES : Data Encryption Standard (1977) AES : Advanced Encryption Standard (2000) RSA : Rivest, Shamir, Adelman (1978) LLL : Lenstra, Lenstra, Lovacz (1982)

SVP : Shortest Vector Problem (and approximate versions) CVP : Closest Vector Problem (and approximate versions) SBP : Shortest Basis Problem (and approximate versions)

(20)

Some acronymes

DES : Data Encryption Standard (1977) AES : Advanced Encryption Standard (2000) RSA : Rivest, Shamir, Adelman (1978) LLL : Lenstra, Lenstra, Lovacz (1982)

SVP : Shortest Vector Problem (and approximate versions) CVP : Closest Vector Problem (and approximate versions) SBP : Shortest Basis Problem (and approximate versions)

(21)

Some acronymes

DES : Data Encryption Standard (1977) AES : Advanced Encryption Standard (2000) RSA : Rivest, Shamir, Adelman (1978) LLL : Lenstra, Lenstra, Lovacz (1982)

SVP : Shortest Vector Problem (and approximate versions) CVP : Closest Vector Problem (and approximate versions) SBP : Shortest Basis Problem (and approximate versions)

(22)

Some acronymes

DES : Data Encryption Standard (1977) AES : Advanced Encryption Standard (2000) RSA : Rivest, Shamir, Adelman (1978) LLL : Lenstra, Lenstra, Lovacz (1982)

SVP : Shortest Vector Problem (and approximate versions) CVP : Closest Vector Problem (and approximate versions) SBP : Shortest Basis Problem (and approximate versions)

(23)

Some acronymes

DES : Data Encryption Standard (1977) AES : Advanced Encryption Standard (2000) RSA : Rivest, Shamir, Adelman (1978) LLL : Lenstra, Lenstra, Lovacz (1982)

SVP : Shortest Vector Problem (and approximate versions) CVP : Closest Vector Problem (and approximate versions) SBP : Shortest Basis Problem (and approximate versions)

(24)

Some acronymes

DES : Data Encryption Standard (1977) AES : Advanced Encryption Standard (2000) RSA : Rivest, Shamir, Adelman (1978) LLL : Lenstra, Lenstra, Lovacz (1982)

SVP : Shortest Vector Problem (and approximate versions) CVP : Closest Vector Problem (and approximate versions) SBP : Shortest Basis Problem (and approximate versions)

(25)

Lattice based cryptosystems (∼ 1995)

Ajtai - Dwork

GGH : Goldreich, Goldwasser, Halevi

NTRU : Number Theorists Are Us (Are Useful) Hoffstein, Pipher and Silverman

(26)

Lattice based cryptosystems (∼ 1995)

Ajtai - Dwork

GGH : Goldreich, Goldwasser, Halevi

NTRU : Number Theorists Are Us (Are Useful) Hoffstein, Pipher and Silverman

(27)

Lattice based cryptosystems (∼ 1995)

Ajtai - Dwork

GGH : Goldreich, Goldwasser, Halevi

NTRU : Number Theorists Are Us (Are Useful) Hoffstein, Pipher and Silverman

(28)

An argument of Paul Turan

Theorem (Fermat). An odd prime pis the sum of two squares if and only ifp is congruent to 1 modulo 4.

Proof.

Step 1. For an odd primep, the following conditions are equivalent.

(i)p1 (mod 4).

(ii)−1 is a square in the finite field Fp. (iii)−1 is a quadratic residue modulo p

(iv) There exists an integerr such that pdivides r2+ 1.

(29)

An argument of Paul Turan

Theorem (Fermat). An odd prime pis the sum of two squares if and only ifp is congruent to 1 modulo 4.

Proof.

Step 1. For an odd primep, the following conditions are equivalent.

(i)p1 (mod 4).

(ii)−1 is a square in the finite field Fp. (iii)−1 is a quadratic residue modulo p

(iv) There exists an integerr such that pdivides r2+ 1.

(30)

An argument of Paul Turan

Step 2. If pis a sum of two squares, then pis congruent to 1 modulo4.

(31)

An argument of Paul Turan

Step 3. Assumep divides r2+ 1. Let L be the lattice with basis(1, r)T,(0, p)T. The determinant of L is p.Using Minkowski’s Theorem with the disk of radiusR, we deduce thatL contains a vector(a, b)T of norm

a2+b2 R as soon asπR2 >4p. Take

R = 2

p

3 so that πR2 >4p and R2 <2p.

Hence there exists such a vector with a2+b2 <2p.

Since(a, b)T ∈ L, there existscZ with b=ar+cp. Since p dividesr2+ 1, it follows that a2+b2 is a multiple of p. The only nonzero multiple ofp of absolute value less than 2p isp.

Hencep=a2+b2.

(32)

An argument of Paul Turan

Step 3. Assumep divides r2+ 1. Let L be the lattice with basis(1, r)T,(0, p)T. The determinant of L is p. Using Minkowski’s Theorem with the disk of radiusR, we deduce thatL contains a vector(a, b)T of norm

a2+b2 R as soon asπR2 >4p. Take

R = 2

p

3 so that πR2 >4p and R2 <2p.

Hence there exists such a vector with a2+b2 <2p.

Since(a, b)T ∈ L, there existscZ with b=ar+cp. Since p dividesr2+ 1, it follows that a2+b2 is a multiple of p. The only nonzero multiple ofp of absolute value less than 2p isp.

Hencep=a2+b2.

(33)

An argument of Paul Turan

Step 3. Assumep divides r2+ 1. Let L be the lattice with basis(1, r)T,(0, p)T. The determinant of L is p. Using Minkowski’s Theorem with the disk of radiusR, we deduce thatL contains a vector(a, b)T of norm

a2+b2 R as soon asπR2 >4p. Take

R = 2

p

3 so that πR2 >4p and R2 <2p.

Hence there exists such a vector with a2+b2 <2p.

Since(a, b)T ∈ L, there existscZ with b=ar+cp. Since p dividesr2+ 1, it follows that a2+b2 is a multiple of p. The only nonzero multiple ofp of absolute value less than 2p isp.

Hencep=a2+b2.

(34)

An argument of Paul Turan

Step 3. Assumep divides r2+ 1. Let L be the lattice with basis(1, r)T,(0, p)T. The determinant of L is p. Using Minkowski’s Theorem with the disk of radiusR, we deduce thatL contains a vector(a, b)T of norm

a2+b2 R as soon asπR2 >4p. Take

R = 2

p

3 so that πR2 >4p and R2 <2p.

Hence there exists such a vector with a2+b2 <2p.

Since(a, b)T ∈ L, there existscZ with b=ar+cp. Sincep dividesr2+ 1, it follows that a2+b2 is a multiple of p. The only nonzero multiple ofp of absolute value less than 2p isp.

Hencep=a2+b2.

(35)

An argument of Paul Turan

Step 3. Assumep divides r2+ 1. Let L be the lattice with basis(1, r)T,(0, p)T. The determinant of L is p. Using Minkowski’s Theorem with the disk of radiusR, we deduce thatL contains a vector(a, b)T of norm

a2+b2 R as soon asπR2 >4p. Take

R = 2

p

3 so that πR2 >4p and R2 <2p.

Hence there exists such a vector with a2+b2 <2p.

Since(a, b)T ∈ L, there existscZ with b=ar+cp. Since p dividesr2+ 1, it follows that a2+b2 is a multiple of p. The only nonzero multiple ofp of absolute value less than 2p isp.

Hencep=a2+b2.

(36)

An argument of Paul Turan

Step 3. Assumep divides r2+ 1. Let L be the lattice with basis(1, r)T,(0, p)T. The determinant of L is p. Using Minkowski’s Theorem with the disk of radiusR, we deduce thatL contains a vector(a, b)T of norm

a2+b2 R as soon asπR2 >4p. Take

R = 2

p

3 so that πR2 >4p and R2 <2p.

Hence there exists such a vector with a2+b2 <2p.

Since(a, b)T ∈ L, there existscZ with b=ar+cp. Since p dividesr2+ 1, it follows that a2+b2 is a multiple of p. The only nonzero multiple ofp of absolute value less than 2p isp.

Hencep=a2+b2.

(37)

An argument of Paul Turan

Step 3. Assumep divides r2+ 1. Let L be the lattice with basis(1, r)T,(0, p)T. The determinant of L is p. Using Minkowski’s Theorem with the disk of radiusR, we deduce thatL contains a vector(a, b)T of norm

a2+b2 R as soon asπR2 >4p. Take

R = 2

p

3 so that πR2 >4p and R2 <2p.

Hence there exists such a vector with a2+b2 <2p.

Since(a, b)T ∈ L, there existscZ with b=ar+cp. Since p dividesr2+ 1, it follows that a2+b2 is a multiple of p. The only nonzero multiple ofp of absolute value less than 2p isp.

Hencep=a2+b2.

(38)

Minkowski’s first Theorem

LetK be a compact convex set in Rn symmetric about 0such that0lies in the interior ofK. Letλ1 =λ1(K) be the infimum of the real numbersλ such that λK contains an integer point inZn distinct from0. Let V =V(K)be the volume of K. Set

˜λ= 2V−1/n. Then ˜λK is a convex body with volume 2n. By Minkowski’s convex body theoremλK˜ contains an integer point6= 0. Thereforeλ1 2V−1/n, which means

λn1V <2n. This is Minkowski’s first Theorem.

(39)

Minkowski’s second theorem

For each integer j with 1j n, let λj =λj(K)be the infimum of allλ >0 such that λK contains j linearly independent integer points. Then

0< λ1 λ2· · · ≤λn <∞.

The numbersλ1, λ2, . . . , λn are the successive minima of K.

Theorem[Minkowski’s second convex body theorem, 1907].

2n

n! λ1· · ·λnV 2n.

(40)

Minkowski’s second theorem

For each integer j with 1j n, let λj =λj(K)be the infimum of allλ >0 such that λK contains j linearly independent integer points. Then

0< λ1 λ2· · · ≤λn <∞.

The numbersλ1, λ2, . . . , λn are the successive minima of K.

Theorem[Minkowski’s second convex body theorem, 1907].

2n

n! λ1· · ·λnV 2n.

(41)

Examples

Examples :

for the cube |xi| ≤1, the volume V is2n and the successive minima are all1.

for the octahedron |x1|+· · ·+|xn| ≤1, the volume V is 2n/n! and the successive minima are all 1.

Remark : Minkowski’s Theorems extend to any full rank latticeL ⊂ Rn : if b1, . . . , bn is a basis of L, taking b1, . . . , bn as a basis of Rn overR amounts to replace L by Zn.

Reference :

W.M. Schmidt. Diophantine Approximation. Lecture Notes in Mathematics785, Chap. 4, Springer Verlag, 1980.

(42)

Examples

Examples :

for the cube |xi| ≤1, the volume V is2n and the successive minima are all1.

for the octahedron |x1|+· · ·+|xn| ≤1, the volume V is 2n/n! and the successive minima are all 1.

Remark : Minkowski’s Theorems extend to any full rank latticeL ⊂ Rn : if b1, . . . , bn is a basis of L, taking b1, . . . , bn as a basis of Rn overR amounts to replace L by Zn.

Reference :

W.M. Schmidt. Diophantine Approximation. Lecture Notes in Mathematics785, Chap. 4, Springer Verlag, 1980.

(43)

Examples

Examples :

for the cube |xi| ≤1, the volume V is2n and the successive minima are all1.

for the octahedron |x1|+· · ·+|xn| ≤1, the volume V is 2n/n! and the successive minima are all 1.

Remark : Minkowski’s Theorems extend to any full rank latticeL ⊂ Rn : if b1, . . . , bn is a basis of L, taking b1, . . . , bn as a basis of Rn overR amounts to replace L by Zn.

Reference :

W.M. Schmidt. Diophantine Approximation. Lecture Notes in Mathematics785, Chap. 4, Springer Verlag, 1980.

(44)

Simultaneous approximation

Proposition(A.K. Lenstra, H.W. Lenstra, L. Lovasz, 1982).

There exists a polynomial-time algorithm that, given a positive integern and rational numbers α1, . . . , αn, satisfying

0< < 1, finds integers p1, . . . , pn, q for which

|pii| ≤ for 1in and 1q2n(n+1)/4−n. Proof. Let L be the lattice of rank n+ 1 spanned by the columns of the (n+ 1)×(n+ 1) matrix

1 · · · 0 −α1 ... . .. ... ... 0 · · · 1 −αn 0 · · · 0 η

with η= 2−n(n+1)/4n+1. The inner product of any two columns is rational. By the LLL algorithm, there is a

polynomial-time algorithm to find a reduced basis b1, . . . , bn+1 forL.

(45)

Simultaneous approximation

Proposition(A.K. Lenstra, H.W. Lenstra, L. Lovasz, 1982).

There exists a polynomial-time algorithm that, given a positive integern and rational numbers α1, . . . , αn, satisfying

0< < 1, finds integers p1, . . . , pn, q for which

|pii| ≤ for 1in and 1q2n(n+1)/4−n. Proof. Let L be the lattice of rank n+ 1 spanned by the columns of the (n+ 1)×(n+ 1) matrix

1 · · · 0 −α1 ... . .. ... ... 0 · · · 1 −αn 0 · · · 0 η

with η= 2−n(n+1)/4n+1. The inner product of any two columns is rational. By the LLL algorithm, there is a

polynomial-time algorithm to find a reduced basis b1, . . . , bn+1 forL.

(46)

Simultaneous approximation

Sincedet(L) =η, we have

2n/4det(L)1/(n+1) = and

|b1| ≤. Sinceb1 ∈ L, we can write

b1 = (p11, p22, . . . , pnn, qη)T

with p1, . . . , pn, q Z. Hence

|pii| ≤ for 1in and |q| ≤2n(n+1)/4−n. From <1 and b1 6= 0 we deduceq 6= 0. Replacing b1 by−b1 if necessary we may assume q >0.

(47)

Dirichlet’s theorems on simultaneous approximation

Letα1, . . . , αn be real numbers and Q >1 an integer.

(i) There exists integers p1, . . . , pn, q with

1q < Q and iqpi| ≤ 1 Q1/n· (ii) There exists integers q1, . . . , qn, p with

1max{|q1|, . . . ,|qn|}< Q and 1q1+· · ·+αnqnp| ≤ 1 Qn·

The proofs are easy applications of Dirichlet Box Principle (see Chap. II of Schmidt LN 785).

(48)

Connection with SVP - (i)

Let >0. Define η=/Q. Consider the L be the lattice of rankn+ 1 spanned by the columns vectors v1, . . . , vn+1 of the (n+ 1)×(n+ 1) matrix

1 · · · 0 −α1 ... . .. ... ... 0 · · · 1 −αn 0 · · · 0 η

.

If v =p1v1+· · ·+pnvn+qvn+1 is an element of L which satisfies 0<max{|v1|, . . . ,|vn+1|}< , then we have

1q < Q and iqpi| ≤·

The determinant of L is η. From Minkowski’s first Theorem, we deduce that there exists such a vector withn+1 = 2n+1η.

Withη =/Q we obtain n= 2n+1/Q

(49)

Connection with SVP - (ii)

Let >0. Define η=/Q. Consider the L be the lattice of rankn+ 1 spanned by the columns vectors v1, . . . , vn+1 of the (n+ 1)×(n+ 1) matrix

η · · · 0 0 ... . .. ... ... 0 · · · η 0 α1 · · · αn −1

.

If v =q1v1+· · ·+qnvn+pvn+1 is an element ofL which satisfies 0<max{|v1|, . . . ,|vn+1|}< , then we have

1qi < /η =Q and 1q1+· · ·+αnqnp|< · The determinant of L is −ηn. From Minkowski’s first Theorem, we deduce that there exists such a vector with n+1 = 2n+1ηn. With η=/Qwe obtain = 2n+1/Qn.

Références

Documents relatifs

L'algorithme de Lenstra, Lenstra, Lovâsz, associé au paramètre t construit, à partir d'une base b de longueur M d'un réseau L de rang n, une base t-réduite au sens de Lovâsz en

Delivery 24. HIV prevention at STI clinics should be standardized to always include the four C’s: compliance to treatment, counselling, contact tracing and condom promotion. VCT

I had several meetings with the staff of the department of mathematics of NUM where they asked me many questions about CIMPA and other international institutions.. They were

We show that an RSA private-key operation can be performed if the attacker has access to an oracle that, for any chosen ciphertext, returns only one bit telling whether

IDEA is the name of the patented and universally applicable block encryption algorithm, which permits the effective protection of transmitted and stored data against

For real-time implementation, we create the plaintext X i first by putting the indices of codewords from C2DVLC bit- stream, which is then encrypted to create Y i and then

(The AES is a new symmetric- based encryption standard under development by NIST. AES is intended to provide strong cryptographic security for the protection of sensitive

`a cl´e publique par Diffie et Hellman, d’o` u le sigle RSA. Au d´epart, Rivest, Shamir et Adleman voulaient prouver que tout syst`eme `a cl´e publique poss`ede une faille... 2