Leo Ducas
unread,Apr 15, 2025, 5:04:32 AMApr 15Sign in to reply to author
Sign in to forward
You do not have permission to delete messages in this group
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to pqc-forum, Kevin Carrier, pqc-...@list.nist.gov, Charles Meyer-Hilfiger, Yixin Shen, Jean-Pierre Tillich, pqc-co...@nist.gov
Dear All,
Thank you Kevin, Charles, Yixin, Jean-Pierre for your careful analysis and report.
While most of the points below are aknowledged in your paper, I would like to highlight the specific cost modeling points that deserve further consideration, to contextualize the numbers you advertised, and invite further work:
A/ As noted on footnote 6, the current estimate use a GSA slope for the output of BKZ, but use a progressive-BKZ costing, undercosting lattice reduction by 2.5 bits [1]
B/ These estimations do not include overheads documented in [2], of about 5 bits at security level 1.
C/ The costs C_add=160 and C_mult=1024 are questionnable, given that one runs an FFT on more than 2^100 scalars. These cost suggest a calculation at 32 bits of precisions, which may lead to numerical error beyond the precision required to detect the solution among the so many candidates.
It should be noted that item B/ applies to both primal and dual attacks: the current best estimate for the primal attack [3] also doesn't include that overhead. Item A/ and C/ are specific to the current analysis of dual attacks.
With A/ and C/ in mind, it seems that the primal and dual attacks are neck-to-neck, and therefore agree with your conclusion that the dual attack should not be dismissed. With B/ in mind, there remains a few bits to be gained by cryptanalysts before the security levels would be convincingly crossed.
[3]
https://eprint.iacr.org/2024/067A Refined Hardness Estimation of LWE in Two-step Mode
Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang
-- Léo