Cybernetics And Systems Analysis logo
Editorial Board Announcements Abstracts Authors Archive
Cybernetics And Systems Analysis
International Theoretical Science Journal
UDC 621.391:519.2
S.M. Ihnatenko1


1 Security Service of Ukraine, Kyiv, Ukraine

mongol_1979@ukr.net

SECURITY ESTIMATES OF A RING-LWE SYMMETRIC CRYPTOSYSTEM
AGAINST CHOSEN PLAINTEXT ATTACK

Abstract. In terms of application of the generalized BKW algorithm, the estimates of security of Ring-LWE symmetric cryptosystem against chosen plaintext attack have been obtained. These estimates allow us to choose the cryptosystem parameters directly proceeding from requirements of its security against chosen plaintext attacks. The ability to apply the generalized BKW algorithm is an important factor that affects the cryptosystem security against chosen plaintext attacks.

Keywords: Ring-LWE cryptosystem, chosen plaintext attack, generalized BKW algorithm, security estimate.



FULL TEXT

REFERENCES

  1. Brakersky Z., Vaikuntanathan V. Fully homomorphic encryption from Ring-LWE and security for key dependent messages In: Rogway P. (ed.). Advances in Cryptology — CRYPTO 2011. LNCS. 2011. Vol. 6841. P. 505–524.

  2. Lyubashevsky V., Peikert C., Regev O. On ideal lattices and learning with errors over rings. In: Gillbert H. (ed.). Advances in Cryptology — EUROCRYPT 2010. LNCS. 2010. Vol. 6110. P. 1–23.

  3. Blum A., Kalai A., Wasserman H. Noise-tolerant learning, the parity problem, and the statistical query model. Journal of the ACM. 2003. Vol. 50, Issue 4. P. 506–519.

  4. Alekseychuk A.M., Ignatenko S.M., Poremsky M.V. Systems of linear equations with distorted right-hand sides over finite rings. Mathematical and Computer Modeling. Ser .: Technical Sciences. 2017. Iss. 15. P. 150–155.

  5. Wood J.A. Duality for modules over finite rings and application to coding theory. American Journal of Mathematics. 1999. Vol. 121, N 3. P. 555–575.
© 2020 Kibernetika.org. All rights reserved.