高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

一种基于提示信息的SVP降维攻击

尹日升 曹金政 马永柳 王洪 程庆丰

尹日升, 曹金政, 马永柳, 王洪, 程庆丰. 一种基于提示信息的SVP降维攻击[J]. 电子与信息学报. doi: 10.11999/JEIT251277
引用本文: 尹日升, 曹金政, 马永柳, 王洪, 程庆丰. 一种基于提示信息的SVP降维攻击[J]. 电子与信息学报. doi: 10.11999/JEIT251277
YIN Risheng, CAO Jinzheng, MA Yongliu, WANG Hong, CHENG Qingfeng. A Reduced-rank Attacks on SVP Using Hints[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT251277
Citation: YIN Risheng, CAO Jinzheng, MA Yongliu, WANG Hong, CHENG Qingfeng. A Reduced-rank Attacks on SVP Using Hints[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT251277

一种基于提示信息的SVP降维攻击

doi: 10.11999/JEIT251277 cstr: 32379.14.JEIT251277
基金项目: 国家自然科学基金(62472438),河南省自然科学基金(242300421414)
详细信息
    作者简介:

    尹日升:硕士生,研究方向为公钥密码、格密码理论

    曹金政:博士生,研究方向为公钥密码、格密码理论

    马永柳:讲师,研究方向为密码协议

    王洪:副教授,研究方向为量子算法与密码分析

    程庆丰:教授,研究方向为后量子密码、密码协议

    通讯作者:

    王洪 007jieyong@sina.com

  • 中图分类号: TP309

A Reduced-rank Attacks on SVP Using Hints

Funds: National Natural Science Foundation of China (62472438), Natural Science Foundation of Henan (242300421414)
  • 摘要: 基于容错学习(LWE)问题及其变体设计的密码算法应用十分广泛,如密钥封装机制Kyber、数字签名Dilithium等。事实上,LWE问题的秘密向量通常为短向量,因此将LWE问题规约到最短向量问题(SVP)是一种常见的求解思路。传统SVP的求解算法包括枚举、筛法以及格基约化算法等。随着侧信道攻击的引入,SVP的求解产生了一些新的思路。该文针对提示信息进行分析,提出了整数提示信息和带模提示信息下的SVP降维攻击方法。实验结果表明,降维攻击方法在实际中具有较强的可行性,能够有效扩展枚举和筛法的应用上界。
  • 图  1  降维攻击方法示意图

    图  2  轮数与降维维度关系示意图

    图  3  小根上界与降维维度关系示意图

    图  4  模数与降维维度关系示意图

    图  5  算法1、算法2与算法5效率对比示意图

     Kannan枚举
     输入:格$ \mathcal{L} $,基$ {b}_{1},{b}_{2},\cdots ,{b}_{n}\in {R}^{n} $
     输出:最短向量$ s $
     1. 假设最短向量$ s $在下的表示系数为$ ({x}_{1},{x}_{2},\cdots ,{x}_{n}) $,初始化为
     $ (0,0,\cdots ,1) $
     2. 利用高斯启发式估计$ {\lambda }_{1}(\mathcal{L}) $的范数$ ||{\lambda }_{1}(\mathcal{L})|| $
     3. 从$ {x}_{n} $开始依次枚举,计算当前最短向量的范数并与
     $ ||{\lambda }_{1}(\mathcal{L})|| $比较
     4. 如果当前最短向量范数小于$ ||{\lambda }_{1}(\mathcal{L})|| $则继续枚举下一个表示
     系数分量,否则重新枚举上一表示系数分量
     5. 当表示系数$ {x}_{1} $枚举结束后,由当前表示系数还原最短向量$ s $
    下载: 导出CSV
     Gauss筛法
     输入:格$ \mathcal{L} $,基$ {b}_{1},{b}_{2},\cdots ,{b}_{n}\in {R}^{n} $,近似最短向量长度$ \mu $,阈值
     c
     输出:最短向量$ s $
     1. 初始化列表$ L=\{0\} $,栈$ \boldsymbol{S}=\varnothing $,碰撞次数$ K=0 $
     2. 若栈$ \boldsymbol{S} $非空,弹出向量$ {v}_{\mathrm{new}} $,否则采样新格向量$ {v}_{\mathrm{new}} $
     3. 对$ {v}_{\mathrm{new}} $高斯约减直至无法约减
     4. 若$ {v}_{\mathrm{new}}=0 $则$ K=K+1 $,返回步骤2
     5. 检查$ L $中是否存在$ {v}_{j} $满足$ ||{v}_{\mathrm{new}}-{v}_{j}|| \lt \mu $
     6. 存在则输出$ s={v}_{\mathrm{new}}-{v}_{j} $并终止算法,否则将$ {v}_{\mathrm{new}} $加入$ L $
     7. 如果$ K \lt c $则返回步骤2,否则终止算法
    下载: 导出CSV
     算法1 基于整数方程的枚举算法
     输入:格$ \mathcal{L} $,基矩阵$ \boldsymbol{B} $,$ m $组提示信息$ ({v}_{i},{\lambda }_{i}) $
     输出:最短向量$ s $
     1. 将$ [\boldsymbol{V}\boldsymbol{B}|-\lambda ] $转换成Hermite标准形$ \mathbf{{\boldsymbol{V}}^{\prime}} $
     2. 求$ \mathbf{{\boldsymbol{V}}^{\prime}}\cdot x=0 $的解空间,得到秘密向量$ x $由特解$ t $和基础解系$ {r}_{1},{r}_{2},\cdots ,{r}_{n-m} $的表示形式
     3. 利用引理1求解$ {c}_{1},{c}_{2},\cdots ,{c}_{n-m} $并还原$ x $
     4. 根据方程$ s=\boldsymbol{B}\cdot x $恢复最短向量$ s $并输出
    下载: 导出CSV
     算法2 基于整数方程的筛法
     输入:格$ \mathcal{L} $,基矩阵$ \boldsymbol{B} $,$ m $组提示信息$ ({v}_{i},{\lambda }_{i}) $
     输出:最短向量$ s $
     1. 将$ [\boldsymbol{V}\boldsymbol{B}|-\lambda ] $转换成Hermite标准形$ {V}^{\prime} $
     2. 求$ \mathbf{{\boldsymbol{V}}^{\prime}}\cdot x=0 $的解空间,得到秘密向量$ x $由特解$ t $和基础解
     系$ {r}_{1},{r}_{2},\cdots ,{r}_{n-m} $的表示形式
     3. 利用$ {r}_{1},{r}_{2},\cdots ,{r}_{n-m} $和特解$ t $构造样本向量
     4. 利用引理2求解$ {c}_{1},{c}_{2},\cdots ,{c}_{n-m} $并还原$ x $
     5. 根据方程$ s=\boldsymbol{B}\cdot x $恢复最短向量$ s $并输出
    下载: 导出CSV
     算法3 基于共模方程的规约求解算法
     输入:格$ \mathcal{L} $,基矩阵$ \boldsymbol{B} $,$ m $组提示信息$ ({v}_{i},{\lambda }_{i},K) $
     输出:最短向量$ s $
     1. 基于$ ({v}_{i},{\lambda }_{i},K) $构造模方程组,并构建系数矩阵
     2. 通过LLL算法降低矩阵的行向量范数,高斯消元减少非零项
     3. 对于矩阵的每一行,利用引理4判断是否能够转换为整数方程
     4. 整理所有整数方程,将问题归约到基于整数提示信息的情形
     5. 调用算法1或算法2求解最短向量$ s $
    下载: 导出CSV
     算法4 基于非共模方程的规约求解算法
     输入:格$ \mathcal{L} $,$ m $组提示信息$ ({v}_{i},{\lambda }_{i},{K}_{i}) $
     输出:最短向量$ s $
     1. 对模数$ {K}_{i} $标准分解,并将共模的模方程整合成若干方程组
     2. 对每个方程组进行LLL预处理,并用高斯消元减少向量中的非
     零项
     3. 对于矩阵的每一行,利用引理4判断是否能够转换为整数方程
     4. 整理所有整数方程,将问题归约到基于整数提示信息的情形
     5. 调用算法1或算法2求解最短向量$ s $
    下载: 导出CSV
     算法5 格基约化求解算法
     输入:格$ \mathcal{L} $,基矩阵$ \boldsymbol{B} $,$ m $组提示信息$ ({v}_{i},{\lambda }_{i},{K}_{i}) $
     输出:最短向量$ s $
     1. 构造$ n+m $维格基矩阵$ {\boldsymbol{A}}_{1} $或$ {\boldsymbol{A}}_{2} $
     2. 利用引理3预处理格基矩阵
     3. 取约化后的首向量作为目标向量的近似值
     4. 还原最短向量$ s $
    下载: 导出CSV

    表  1  算法3转化效率统计表

    轮数小根上界原始维数平均降维维度降维后维度转化效率(%)
    1170
    80
    90
    16
    15
    13
    54
    65
    77
    22.86
    18.75
    14.44
    270
    80
    90
    9
    7
    9
    61
    73
    81
    12.86
    8.75
    10.00
    2170
    80
    90
    35
    36
    28
    34
    44
    62
    50.00
    45.00
    31.11
    270
    80
    90
    17
    16
    15
    53
    64
    65
    24.29
    20.00
    16.67
    3170
    80
    90
    35
    40
    34
    35
    40
    46
    50.00
    50.00
    37.78
    270
    80
    90
    25
    24
    29
    45
    56
    61
    35.71
    30.00
    32.22
    下载: 导出CSV
  • [1] KANNAN R. Improved algorithms for integer programming and related lattice problems[C]. Proceedings of the 15th Annual ACM Symposium on Theory of Computing, New York, USA, 1983: 193–206. doi: 10.1145/800061.808749.
    [2] AONO Y and NGUYEN P Q. Random sampling revisited: Lattice enumeration with discrete pruning[C]. Proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques Advances in Cryptology, Pairs, France, 2017: 65–102. doi: 10.1007/978-3-319-56614-6_3.
    [3] ZHENG Zhongxiang, WANG Xiaoyun, XU Guangwu, et al. Orthogonalized lattice enumeration for solving SVP[J]. Science China Information Sciences, 2018, 61(3): 032115. doi: 10.1007/s11432-017-9307-0.
    [4] YAMAMURA K, WANG Yuntao, and FUJISAKI E. Improved lattice enumeration algorithms by primal and dual reordering methods[C]. Proceedings of the 24th International Conference on Information Security and Cryptology, Seoul, South Korea, 2022: 159–174. doi: 10.1007/978-3-031-08896-4_8.
    [5] ALBRECHT M R, BAI Shi, LI Jianwei, et al. Lattice reduction with approximate enumeration oracles: Practical algorithms and concrete performance[C]. Proceedings of the Advances in Cryptology-41st Annual International Cryptology Conference, 2021: 732–759. doi: 10.1007/978-3-030-84245-1_25. (查阅网上资料,未找到对应的出版地信息,请确认).
    [6] AONO Y, NGUYEN P Q, and SHEN Yixin. Quantum lattice enumeration and tweaking discrete pruning[C]. Proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security Advances in Cryptology, Brisbane, Australia, 2018: 405–434. doi: 10.1007/978-3-030-03326-2_14.
    [7] AJTAI M, KUMAR R, and SIVAKUMAR D. A sieve algorithm for the shortest lattice vector problem[C]. Proceedings of the 33rd Annual ACM Symposium on Theory of Computing, Heraklion, Greece, 2001: 601–610. doi: 10.1145/380752.380857.
    [8] MICCIANCIO D and VOULGARIS P. Faster exponential time algorithms for the shortest vector problem[C]. Proceedings of the 21st Annual ACM-SIMA Symposium on Discrete Algorithms, Austin, USA, 2010: 1468–1480.
    [9] BONNETAIN X, CHAILLOUX A, SCHROTTENLOHER A, et al. Finding many collisions via reusable quantum walks: Application to lattice sieving[C]. Proceedings of the 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques Advances in Cryptology, Lyon, France, 2023: 221–251. doi: 10.1007/978-3-031-30589-4_8.
    [10] LENSTRA A K, LENSTRA H W, and LOVÁSZ L. Factoring polynomials with rational coefficients[J]. Mathematische Annalen, 1982, 261(4): 515–534. doi: 10.1007/BF01457454.
    [11] SCHNORR C P and EUCHNER M. Lattice basis reduction: Improved practical algorithms and solving subset sum problems[J]. Mathematical Programming, 1994, 66(1/3): 181–199. doi: 10.1007/BF01581144.
    [12] CHEN Yuanmi and NGUYEN P Q. BKZ 2.0: Better lattice security estimates[C]. Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security Advances in Cryptology, Seoul, South Korea, 2011: 1–20. doi: 10.1007/978-3-642-25385-0_1.
    [13] ALBRECHT M R, BAI Shi, FOUQUE P A, et al. Faster enumeration-based lattice reduction: Root hermite factor k1/(2k) time kk/8+o(k)[C]. Proceedings of the 40th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, USA, 2020: 186–212. https://doi.org/10.1007/978-3-030-56880-1_7.
    [14] 袁庆军, 张浩金, 樊昊鹏, 等. DTDS: 用于侧信道能量分析的Dilithium数据集[J]. 电子与信息学报, 2025, 47(8): 2499–2508. doi: 10.11999/JEIT250048.

    YUAN Qingjun, ZHANG Haojin, FAN Haopeng, et al. DTDS: Dilithium dataset for power analysis[J]. Journal of Electronics & Information Technology, 2025, 47(8): 2499–2508. doi: 10.11999/JEIT250048.
    [15] 罗玉玲, 徐海洋, 欧阳雪, 等. 高效侧信道分析: 从协同去噪到自适应B样条降维[J]. 电子与信息学报, 2026, 48(3): 1354–1365. doi: 10.11999/JEIT251047.

    LUO Yuling, XU Haiyang, OUYANG Xue, et al. High-efficiency side-channel analysis: From collaborative denoising to adaptive B-spline dimension reduction[J]. Journal of Electronics & Information Technology, 2026, 48(3): 1354–1365. doi: 10.11999/JEIT251047.
    [16] DACHMAN-SOLED D, DUCAS L, GONG Huijing, et al. LWE with side information: Attacks and concrete security estimation[C]. Proceedings of the 40th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, USA, 2020: 329–358. doi: 10.1007/978-3-030-56880-1_12.
    [17] LI Zhiwei, XU Jun, SONG Jun, et al. Improved attacks against lattice-based KEMs using hints from Hertzbleed[J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025, 2025(4): 463–485. doi: 10.46586/tches.v2025.i4.463-485.
    [18] LU Qian, FENG Yansong, and PAN Yanbin. Solving LWE with independent hints about secret and errors[EB/OL]. https://eprint.iacr.org/2025/1128, 2025.
    [19] DAMM S, FISCHER A, MAY A, et al. Solving concealed ILWE and its application for breaking masked dilithium[EB/OL]. https://eprint.iacr.org/2025/1629, 2025.
    [20] 陈韬, 赵旺鹏, 别梦妮, 等. 格基后量子密码双域可重构多项式乘法运算单元架构研究[J]. 电子与信息学报, 2025. doi: 10.11999/JEIT250929. (查阅网上资料,未找到对应的卷期页码信息,请确认).

    CHEN Tao, ZHAO Wangpeng, BIE Mengni, et al. Research on the architecture of dual-field reconfigurable polynomial multiplication unit for lattice-based post-quantum cryptography[J]. Journal of Electronics & Information Technology, 2025. doi: 10.11999/JEIT250929.
    [21] CAO Jinzheng, JIANG Haodong, and CHENG Qingfeng. Refined attack on LWE with hints: Constructing lattice via Gaussian elimination[C]. Proceedings of the 45th Annual International Cryptology Conference on Advances in Cryptology, Santa Barbara, USA, 2025: 385–416. doi: 10.1007/978-3-032-01855-7_13.
    [22] SCHNORR C P and EUCHNER M. Lattice basis reduction: Improved practical algorithms and solving subset sum problems[J]. Mathematical Programming, 1994, 66(1/3): 181–199. doi: 10.1007/BF01581144. (查阅网上资料,本条文献与第11条文献重复,请确认).
    [23] HOWGRAVE-GRAHAM N. Finding small roots of univariate modular equations revisited[C]. 6th IMA International Conference on Cryptography and Coding, Cirencester, UK, 1997: 131–142. doi: 10.1007/BFb0024458.
  • 加载中
图(5) / 表(8)
计量
  • 文章访问数:  26
  • HTML全文浏览量:  5
  • PDF下载量:  6
  • 被引次数: 0
出版历程
  • 修回日期:  2026-04-08
  • 录用日期:  2026-04-08
  • 网络出版日期:  2026-04-27

目录

    /

    返回文章
    返回