Hi submitters and all,
I have a comment regarding the quantum security estimates for SIKE, which may also be of some general interest regarding how quantum attacks are evaluated. In particular, based on the known attacks, it seems to me that the parameters submitted as security strength 1 and 3 should probably be regarded as security strength 2 and 4 respectively.
The quantum security estimate is based on applying Tani’s claw finding algorithm (https://arxiv.org/abs/0708.2584 ) to find a collision between two different functions on domains of size p^(1/4). The algorithm is given for a quantum random access machine, and it requires a memory of size O(p^(1/6) ) and O(p^(1/6)) oracle queries (when the queries are performed in series.) As such, the algorithm seems to have the same memory complexity, query complexity, and parallelizability as the Brassard-Hoyer-Tapp(BHT) algorithm (https://arxiv.org/abs/quant-ph/9705002 ) applied to finding a collision on a hash function with output size log_2(p^(1/2)). I am personally fairly convinced by analyses such as (https://cr.yp.to/hash/collisioncost-20090517.pdf , https://arxiv.org/abs/1207.2307 , and my own https://arxiv.org/abs/1709.10510 ) that the quantum algorithm for collision search is no better than the best classical algorithms in any physically plausible model of computation. But whether you buy that or not, it seems like direct comparison between Tani and BHT would be enough to justify the claim that breaking SIKE503, for example, with known attacks is no easier than finding collisions in SHA256.
Please let me know if there are any errors in the above analysis. Is there some model of computation I’m not thinking of where, for example, the known attacks on SIKE503 are appreciably cheaper than the known collision attacks on SHA256?
Thanks,
Ray
P.S. The submission gives a detailed analysis of the number of gates involved in the query portion of the computation, and it looks correct as far as I can tell. However, the estimate does not include gates for memory access. In the gate model proper, querying a memory of size p^(1/6) in series p^(1/6) times requires O(p^(1/3)) gates, which is already larger than the classical security estimate. (This is one additional reason the NIST postquantum call for proposals does not list a lower estimate for quantum vs classical gate requirements at security strengths 2 and 4.) Security estimates that ignore the gate cost of quantum memory access are probably better described as using the quantum random access machine model of computation. There is some theoretical justification for thinking that quantum memory access may be cheaper than is implied by the gate model and more in line with the quantum random access machine model (https://arxiv.org/abs/0708.1879). Of course, unlike the case of classical computers (where access to a terabyte memory clearly does not cost a trillion times as much as an ordinary CPU instruction), it is somewhat controversial whether an efficient quantum RAM can be achieved in practice – the needs of fault tolerance suggest that in any near to medium term quantum computing technology, you’re going to need to be continuously performing physical gates on memory qubits while they’re at rest anyway.
Hi Ray,
I believe you are correct. Under current knowledge the parameter
sets SIKEp503 and SIKEp751 satisfy respectively security
categories 2 and 4 in addition to 1 and 3, even though we did not
state so in the submission. The claw-finding problem is directly
comparable to the problem of finding a hash collision. Thanks for
the clarification.
-David
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
Visit this group at https://groups.google.com/a/list.nist.gov/group/pqc-forum/.
> an email to pqc-forum+unsubscribe@list.nist.gov.
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+unsubscribe@list.nist.gov.
Hi Sam,
Thanks for the clarification.
My concern with your SIKE503 example is that you seem to be comparing a parallel implementation of Grover with a serial implementation of Tani. If we assume, as the SIKE submission does, that Tani’s algorithm parallelizes like Grover, then by parallelizing Tani 2^83 ways, we would expect to reduce the time per processor to 2^42. Grover could only search a space of size 2^167 in the same time.
There does seem to be some treatment of parallelizing quantum walk algorithms in the literature (e.g. https://arxiv.org/pdf/1309.6116.pdf ) although it will likely need to be adapted slightly to impose a memory requirement other than parallelism times time. Treating claw finding between functions with domain size N as equivalent to element distinctness on a set of size N or 2-sum on a list of size N, the results of the above paper appear consistent with my previous assumption that the time required for a parallelized instance of Tani’s algorithm is sqrt (N^2/ M p), where M is memory and p is parallelism (I’m again assuming that M is set equal to parallelism times time.)
Best,
Ray
From: Sam Jaques [mailto:sam.e....@gmail.com]
Sent: Wednesday, April 04, 2018 3:10 PM
To: Perlner, Ray (Fed) <ray.p...@nist.gov>
Cc: fran...@cs.cinvestav.mx; pqc-comments <pqc-co...@nist.gov>; pqc-...@list.nist.gov
Subject: Re: [pqc-forum] OFFICIAL COMMENT: SIKE
Hello Ray,
> an email to pqc-forum+...@list.nist.gov.
> Visit this group at
> https://groups.google.com/a/list.nist.gov/group/pqc-forum/.
>
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.