scispace - formally typeset
Open AccessPosted Content

How to Sequentialize Independent Parallel Attacks? Biased Distributions Have a Phase Transition

TLDR
In this article, it was shown that the optimal strategy for learning parity with noise (LPN) and password search with infinite number of attacks is to run an attack for m steps and try again with another attack until one succeeds.
Abstract
We assume a scenario where an attacker can mount several independent attacks on a single CPU Each attack can be run several times in independent ways Each attack can succeed after a given number of steps with some given and known probability A natural question is to wonder what is the optimal strategy to run steps of the attacks in a sequence In this paper, we develop a formalism to tackle this problem When the number of attacks is infinite, we show that there is a magic number of steps m such that the optimal strategy is to run an attack for m steps and to try again with another attack until one succeeds We also study the case of a finite number of attacks We describe this problem when the attacks are exhaustive key searches, but the result is more general We apply our result to the learning parity with noise (LPN) problem and the password search problem Although the optimal m decreases as the distribution is more biased, we observe a phase transition in all cases: the decrease is very abrupt from m corresponding to exhaustive search on a single target to m = 1 corresponding to running a single step of the attack on each target For all practical biased examples, we show that the best strategy is to use m = 1 For LPN, this means to guess that the noise vector is 0 and to solve the secret by Gaussian elimination This is actually better than all variants of the Blum-KalaiWasserman (BKW) algorithm

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

Optimization of $$\mathsf {LPN}$$ Solving Algorithms

TL;DR: An algorithm is constructed that automatizes the generation of \(\mathsf {LPN}\) solving algorithms from the considered parameters and proposes concrete practical codes and a method to find good codes.
References
More filters
Journal ArticleDOI

On lattices, learning with errors, random linear codes, and cryptography

TL;DR: A (classical) public-key cryptosystem whose security is based on the hardness of the learning problem, which is a reduction from worst-case lattice problems such as GapSVP and SIVP to a certain learning problem that is quantum.
Journal ArticleDOI

A cryptanalytic time-memory trade-off

TL;DR: A probabilistic method is presented which cryptanalyzes any N key cryptosystem in N 2/3 operational with N2/3 words of memory after a precomputation which requires N operations, and works in a chosen plaintext attack and can also be used in a ciphertext-only attack.
Proceedings ArticleDOI

The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords

TL;DR: It is estimated that passwords provide fewer than 10 bits of security against an online, trawling attack, and only about 20 bits ofSecurity against an optimal offline dictionary attack, when compared with a uniform distribution which would provide equivalent security against different forms of guessing attack.
Proceedings ArticleDOI

Guessing and entropy

TL;DR: It is shown that the average number of successive guesses, E,[G], required with an optimum strategy until one correctly guesses the value of a discrete random X, is underbounded by the entropy H(X) in the manner E[G]/spl ges/( 1/4 )2/sup H(x/)+1 provided that H( X)/spl ge/2 bits.
Book ChapterDOI

Making a Faster Cryptanalytic Time-Memory Trade-Off

TL;DR: A new way of precalculating the data is proposed which reduces by two the number of calculations needed during cryptanalysis and it is shown that the gain could be even much higher depending on the parameters used.
Related Papers (5)