2023-05-02
Hull attacks on the lattice isomorphism problem
Publication
Publication
The lattice isomorphism problem (LIP) asks one to find an isometry between two lattices. It has recently been proposed as a foundation for cryptography in two independent works [Ducas & van Woerden, EUROCRYPT 2022, Bennett et al. preprint 2021]. This problem is the lattice variant of the code equivalence problem, on which the notion of the hull of a code can lead to devastating attacks. In this work we study the cryptanalytic role of an adaptation of the hull to the lattice setting, namely, the s-hull. We first show that the s-hull is not helpful for creating an arithmetic distinguisher. More specifically, the genus of the s-hull can be efficiently predicted from s and the original genus and therefore carries no extra information. However, we also show that the hull can be helpful for geometric attacks: for certain lattices the minimal distance of the hull is relatively smaller than that of the original lattice, and this can be exploited. The attack cost remains exponential, but the constant in the exponent is halved. This second result gives a counterexample to the general hardness conjecture of LIP proposed by Ducas & van Woerden. Our results suggest that one should be very considerate about the geometry of hulls when instantiating LIP for cryptography. They also point to unimodular lattices as attractive options, as they are equal to their dual and their hulls, leaving only the original lattice to an attacker. Remarkably, this is already the case in proposed instantiations, namely the trivial lattice Zn and the Barnes-Wall lattices.
Additional Metadata | |
---|---|
, , , , | |
doi.org/10.1007/978-3-031-31368-4_7 | |
Lecture Notes in Computer Science/Lecture Notes in Artificial Intelligence | |
A Reduction Theory for Codes and Lattices in Cryptography | |
26th IACR International Conference on Practice and Theory of Public-Key Cryptography | |
Ducas, L., & Gibbons, S. (2023). Hull attacks on the lattice isomorphism problem. In Public-Key Cryptography (pp. 177–204). doi:10.1007/978-3-031-31368-4_7 |