SlideShare a Scribd company logo
1 of 69
Download to read offline
Gröbner Bases Techniques in Post-Quantum
Cryptography
Ludovic Perret
Sorbonne Universités, UPMC Univ Paris 06, INRIA Paris
LIP6, PolSyS Project, Paris, France
Post-Quantum Cryptography Winter School, Fukuoka, Japan
Post-Quantum Revolution
NIST aims to standardize quantum-resistant algorithms within 2020
Main challenge is to understand precisely the hardness.
Codes-
based
(Tanja’s
talk)
hash-based
(Andrea’s
talk)
Lattice-
Based
(Phong’s
talk)
MQ-based
(Jintai’s
talk)
Post-Quantum Revolution
Gröbner bases is a major tool for quantum resistant schemes
Codes-
based
(Tanja’s
talk)
hash-based
(Andrea’s
talk)
Lattice-
Based
(Phong’s
talk)
MQ-based
(Jintai’s
talk)
Post-Quantum Revolution
Codes-
based
(Tanja’s
talk)
hash-based
(Andrea’s
talk)
Lattice-
Based
(Phong’s
talk)
MQ-based
(Jintai’s
talk)
Multivariate : intrinsic tool
Code-based : emerging tool
J.-C. Faugère, V. Gauthier-Umana, A.
Otmani, L. P., J.-P. Tillich.
A Distinguisher for High Rate McEliece
Cryptosystems.
IEEE-IT 13.
A. Couvreur, A. Otmani, J.-P. Tillich.
Polynomial Time Attack on Wild McEliece
over Quadratic Extensions.
EUROCRYPT 2014.
J.-C. Faugère, A. Otmani, L. P., F. De
Portzamparc, J.-P. Tillich.
Structural Cryptanalysis of McEliece Schemes
with Compact Keys.
DCC’2015.
PQC’16 program (Rank codes, Polar Codes)
LWE-based : new tool for asympt. hardness
Hash-based : minor impact
Algebraic Cryptanalysis
Idea
Model a cryptosystem as a set of algebraic equations
Try to solve this system (code-based, multivariate based), or
estimate the difficulty of solving (LWE)
⇒ Gaussian Elimination, Gröbner basis, SAT-solver. . .
N. Courtois, J. Ding, J.-C. Faugère, W. Meier, J. Patarin, A. Shamir,
B.-Y. Yang . . .
Cryptosystem
(+ messages, ciphertexts. . . )
4 x2 + 5 x + 6 y2 + 3 y z + 5 y + 1,
5 x2 + x y + 2 x z + 6 z2 + 3 z + 3,
6 x z + 5 y2 + 2 y + 4 z2 + 6 z + 5
x = 4
y = 2
z = 0
Secret
Modeling
Solving
Polynomial System Solving (PoSSo)
q, size of field n, nb. of variables m, nb. of equations
PoSSo
Input. non-linear polynomials p1, . . . , pm ∈ Fq[x1, . . . , xn]
Question. Find – if any – (z1, . . . , zn) ∈ Fn
q such that:



p1(z1, . . . , zn) = 0,
...
pm(z1, . . . , zn) = 0 .
Remark
PoSSo is NP-hard
Random instances of PoSSo are hard to solve in practice.
PoSSo Fukuoka Challenges
https://www.mqchallenge.org
Methodology
Difficulties
Modeling : describe a
cryptosystem as a set of
algebraic of equations
“universal” approach
(PoSSo is NP-Hard)
⇒ several models are
possible !!!
Solving
⇒ Minimize the number
of variables/degree
⇒ Maximize the number
of equations
Specificity
cryptographic context
Gröbner bases
Gröbner Basis
Linear system Non linear system


1(x1, . . . , xn) = 0
· · ·
m(x1, . . . , xn) = 0



p1(x1, . . . , xn) = 0
· · ·
pm(x1, . . . , xn) = 0
V = VecFq
( 1, . . . , m) I = f1, . . . , fm
Gauss reduction of V Gröbner basis I
Definition [B. Buchberger’1965]
Let be a mon. ordering (LEX or DRL), and I ⊂ Fq[x1, . . . , xn].
G ⊂ I is a Gröbner basis iff:
∀f ∈ I ∃g ∈ G such that LeadingTerm (g) | LeadingTerm (f ).
Zero-Dimensional Strategy
p1(x1, . . . , xn)
...
pm(x1, . . . , xn)
Initial syst.
⇒compute GB
g1(x1, . . . , xn)
...
gs(xn)
LEX-GB
Zero-Dimensional Strategy
p1(x1, . . . , xn)
...
pm(x1, . . . , xn)
Initial syst.
⇒compute GB
g1(x1, . . . , xn)
...
gr (x1, . . . , xn)
DRL-GB
⇒change order
g1(x1, . . . , xn)
...
gs(xn)
LEX-GB
Computing a Gröbner Basis
B. Buchberger
“An Algorithm for Finding the Basis Elements of the
Residue Class Ring of a Zero Dimensional
Polynomial Ideal”, PhD thesis, 1965.
J.-C. Faugère.
“A New Efficient Algorithm for Computing Gröbner
Bases (F4).
Journal of Pure and Applied Algebra, 1999.
J.-C. Faugère.
“A New Efficient Algorithm for Computing Gröbner
bases Without Reduction to Zero (F5).”
ISSAC, 2002.
. . .
...
C. Eder and J.-C. Faugère.
“A Survey on Signature-Based Gröbner Basis
Computations”.
ArXiv, April 2014.
B. Buchberger.
Computing a Gröbner Basis
Macaulay Matrix Macaulay
d,m of degree d
p1, . . . , pm ∈ Fq[x1, . . . , xn]
monomial ordering (LEX, or DRL)
ti,j monomials of degree d − deg(fi )
mono. of deg. D sorted for
t1,1 p1
t1,2 p1
...
tm,1 pm
tm,2 pm
...











. . . . . . . . .
. . . Coeff(t pi , ) . . .
...
. . . . . . . . .
. . . . . . . . .











Polynomial System Solving
Macaulay matrix Macaulay
d,m in degree d
p1 = · · · = pm = 0
Gröbner: total degree
Gröbner: lexicographical
Gaussian Elimination of
matrices up to degree
Dreg
O( n+Dreg
n
ω
)
˜O(#Sols3
)
•Buchberger (1965
•F4 (1999)
•F5 (2002)
• . . .
•FGLM (1993)
GB complexity is driven by the
maximal degree Dreg reached
GBLA
GBLA team: B. Boyer, C. Eder, J.-C Faugère, F. Martani
http://www-polsys.lip6.fr/~jcf/GBLA/index.html
Complexity
Degree of Regularity
Let p1, . . . , pm ∈ Fq[x1, . . . , xn] be homogeneous polynomials.
Dreg = mind dimK({p ∈ p1, . . . , pm | deg(p) = d}) =
n + d − 1
d
.
Complexity
Semi-Regular Sequence [Bardet, Faugère, Salvy, Yang, MEGA’2003]
p1, . . . , pm ∈ Fq[x1, . . . , xn] (m > n) be hom. polynomials of degree d. If
the system is semi-regular, then Dreg is the index of the first non-positive
coeff. 0
d 0
hd zd
=
(1 − zd )m
(1 − z)n
hd rank defects of Macaulay
d,m
Only trivial relations pi pj = pj pi
For non-homogenous polynomials, homogeneous part of highest degree
Fröberg’s conjecture : semi-regular sequences exist !
Example (n = 5, m = 6, d = 2)
1 + 5 x + 9 x2
+ 5 x3
− 4 x4
+ . . .
Complexity
Asymptotic Expansion [Bardet, Faugère, Salvy, Yang, MEGA’2003]
Let p1, . . . , pm ∈ Fq[x1, . . . , xn] be a semi-regular system of m = C · n
quadratic equations with C > 1 a constant :
Dreg ≈ C −
1
2
− C(C − 1) n.
Complexity
Global Picture [Bardet, Faugère, Salvy, Research Report, 2003]
Let p1, . . . , pm ∈ Fq[x1, . . . , xn] be a semi-regular system of m quadratic
equations:
poly-time complexity if m = n+2
2 (Linearization bound)
poly-time complexity for GB if m = n+1
2
sub-exponential complexity if m = ˜O(n)
exponential complexity if m = O(n) or m = n + Cst
Algebraic Algorithms for LWE Problems
Plan
1 Algebraic Algorithms for LWE
Problems (joint work with
M. Albrecht, C. Cid, J.-C
Faugère)
Linear Equations with Noise →
Noise-Free Algebraic Equations
A Gröbner Basis Algorithm for
BinaryErrorLWE
2 Gröbner Bases Techniques in
MPQC (joint work with L.
Bettale, and J.-C Faugère)
MinRank Attack on HFE
Solving MinRank
3 Real-Life Deployment of
Multivariate Cryptography
(joint work with J.-C Faugère)
W. Gröbner.
Algebraic Algorithms for LWE Problems
Learning With Errors (LWE)
LWE(α)
Input. a random matrix G ∈ Fn×m
q and c ∈ Fm
q .
Question. Find – if any – a secret (s1, . . . , sn) ∈ Fn
q such that:
error = c − (s1, . . . , sn) × G ∈ Fm
q is “small ”.
q ∈ poly(n), prime
special error distribution s.t. | errori | αq q
Many cryptosystems based on LWE
Connection to worst-case GAPSVP α · q
√
n
O. Regev.
“On Lattices, Learning with
Errors, Random Linear Codes,
and Cryptography”.
Journal of the ACM, 2009.
Z. Brakerski, A. Langlois, C.
Peikert, O. Regev, D. Stehlé.
“Classical Hardness of Learning
with Error”.
STOC 2013.
Algebraic Algorithms for LWE Problems
LWE with Binary Errors
BinaryErrorLWE
Input. a random matrix G ∈ Fn×m
q and c ∈ Fm
q .
Question. Find – if any – a secret (s1, . . . , sn) ∈ Fn
q such that:
error = c − (s1, . . . , sn) × G ∈ {0, 1}m
.
N. Döttling, J. Müller-Quade.
“Lossy Codes and a New Variant of the Learning with Errors Problem”.
Eurocrypt’13.
D. Micciancio, C. Peikert.
“Hardness of SIS and LWE with Small Parameters”.
CRYPTO’13.
Algebraic Algorithms for LWE Problems
LWE with Binary Errors
D. Micciancio, C. Peikert.
“Hardness of SIS and LWE with Small Parameters”.
CRYPTO’13.
BinaryErrorLWE
Input. a random matrix G ∈ Fn×m
q and c ∈ Fm
q .
Question. Find – if any – a secret (s1, . . . , sn) ∈ Fn
q such that:
error = c − (s1, . . . , sn) × G ∈ {0, 1}m
.
Hardness Results
 Reduction from BinaryErrorLWE with m = n 1 + Ω 1/ log(n) to
the worst-case Gap-SVP
[Arora-Ge’10] Proven polynomial-time algorithm by linearization if
m ∈ O(n2)
Algebraic Algorithms for LWE Problems
Algebraic Cryptanalysis
Model BinaryErrorLWE as a set of non-linear equations
⇒ [Arora-Ge’10,] Linear Equations with noise to noise-free algebraic
equations
Solve this system and estimate the difficulty of solving
⇒ [Arora-Ge’10, Ding’10] Linearization
⇒ Complexity analysis with Gröbner bases under a genericity assumption
⇒ Hardness of BinaryErrorLWE for n 1 + Ω 1/ log(n)  m  O(n2
).
⇒ Exp. speed up w.r.t. to Arora-Ge for LWE(α)
S. Arora, and R. Ge.
“New Algorithms for Learning in
Presence of Error”.
ICALP’11  Electronic
Colloquium on Computational
Complexity, April 2010.
J. Ding.
“Solving LWE Problem with
Bounded Errors in Polynomial
Time”.
IACR Cryptology ePrint Archive,
November 2010.
Algebraic Algorithms for LWE Problems
Plan
1 Algebraic Algorithms for LWE Problems (joint work with
M. Albrecht, C. Cid, J.-C Faugère)
Linear Equations with Noise → Noise-Free Algebraic Equations
A Gröbner Basis Algorithm for BinaryErrorLWE
2 Gröbner Bases Techniques in MPQC (joint work with L. Bettale,
and J.-C Faugère)
MinRank Attack on HFE
Solving MinRank
3 Real-Life Deployment of Multivariate Cryptography (joint work
with J.-C Faugère)
Algebraic Algorithms for LWE Problems
Algebraic Modelling
BinaryErrorLWE
Input. a random matrix G ∈ Fn×m
q , and c ∈ Fm
q .
Question. Find – if any – (s1, . . . , sn) ∈ Fn
q such that:
c − (s1, . . . , sn) × G = error ∈ {0, 1}m
.
m linear equations in n variables over Fq with binary noise.
Algebraic Algorithms for LWE Problems
Algebraic Modelling
BinaryErrorLWE
Input. a random matrix G ∈ Fn×m
q , and c ∈ Fm
q .
Question. Find – if any – (s1, . . . , sn) ∈ Fn
q such that:
c − (s1, . . . , sn) × G = error ∈ {0, 1}m
.
m linear equations in n variables over Fq with binary noise.
Arora-Ge (AG) Modelling
Let P(X) = X(X − 1):
p1 = P c1 −
n
j=1
sj Gj,1 = 0, . . . , pm = P cm −
n
j=1
sj Gj,m = 0.
m quadratic equations in n variables over Fq.
Algebraic Algorithms for LWE Problems
Until Now
P(X) = X(X − 1) ∈ Fq[X] be vanishing on the errors.
AG Modelling
Solving BinaryErrorLWE ≡
p1 = P c1 −
n
j=1
xj Gj,1 = 0, . . . , pm = P cm −
n
j=1
xj Gj,m = 0.
AG algorithm
BinaryErrorLWE: m quadratic equations in n variables over Fq.
 Linearisation → polynomial-time algo. when m = O(n2
).
Algebraic Algorithms for LWE Problems
Linear Independence
Theorem
Let P(x) = X(X − 1). If q  2m, then for all m, 1 m n+1
2 :
p1 = P c1 −
n
j=1
xj Gj,1 , . . . , pm = P cm −
n
j=1
xj Gj,m ,
are linearly independent with probability 1 − 2m
q .
Algebraic Algorithms for LWE Problems
Linear Independence
Proof.
Mat: a sub-matrix of size m × m of the Macaulay matrix at degree 2
p(G) = Det(Mat).
if p(G) is non-zero, then by Schwartz-Zippel-DeMillo-Lipton:
PrG (p(G) = 0) 1 −
2m
q
.
Find G∗ such that p(G∗) = 0:




1 1 1 1 0 0 0 0 0 0
0 1 0 0 1 1 1 0 0 0
0 0 1 0 0 1 0 1 1 0
0 0 0 1 0 0 1 0 1 1




Algebraic Algorithms for LWE Problems
Plan
1 Algebraic Algorithms for LWE Problems (joint work with
M. Albrecht, C. Cid, J.-C Faugère)
Linear Equations with Noise → Noise-Free Algebraic Equations
A Gröbner Basis Algorithm for BinaryErrorLWE
2 Gröbner Bases Techniques in MPQC (joint work with L. Bettale,
and J.-C Faugère)
MinRank Attack on HFE
Solving MinRank
3 Real-Life Deployment of Multivariate Cryptography (joint work
with J.-C Faugère)
Algebraic Algorithms for LWE Problems
Solving BinaryErrorLWE with Gröbner Bases
Assumption
Systems occurring in the AGD modelling are semi-regular.
Rank condition on the Macaulay matrices.
Algebraic Algorithms for LWE Problems
Solving BinaryErrorLWE with Gröbner Bases
Asymptotic Expansion
Let p1, . . . , pm ∈ Fq[x1, . . . , xn] be a semi-regular system of m = C · n
quadratic equations with C  1 :
Dreg ≈ C −
1
2
− C(C − 1) n.
Theorem
Under the semi-regularity assumption:
If m = n 1 + 1
log(n) , one can solve BinaryErrorLWE in O 23.25·n
.
If m = 2 · n, BinaryErrorLWE can be solved in O 21.02·n
.
If m = O (n log log n), one can solve BinaryErrorLWE in O 2
3n log log log n
8 log log n .
Algebraic Algorithms for LWE Problems
About the Assumption
Assumption
Systems occurring in the Arora-Ge modelling are semi-regular.
Rank condition on the Macaulay matrices.
Magma 2.19 Dreg Dreal Time
n ∈ {5, . . . , 25} m = n · log2(n) 3 3 24 sec.
n ∈ {26, . . . , 53} m = n · log2(n) 4 4 6 days
n = 60 m = 709 2 n log2(n) 3 3 32 min.
n = 100 m = 1728 2.6 n log2(n) 3 3 40 h.
Algebraic Algorithms for LWE Problems
About the Assumption
Assumption
Systems occurring in the Arora-Ge modelling are semi-regular.
Rank condition on the Macaulay matrices.
Full proof of the assumption ≡ proving the well known Fröberg’s
conjecture
Semi-regularity of powers of generic linear forms [R. Fröberg, J.
Hollman, JSC’94]
Assumption proved in restricted cases
M. Albrecht, C. Cid, J.-C Faugère, L. Perret.
“Algebraic Algorithms for LWE”.
IACR Eprint, 2014.
Similar analysis for LWE(α)
⇒ Exp. speed up w.r.t. to Arora-Ge for LWE(α)
Plan
1 Algebraic Algorithms for LWE
Problems (joint work with
M. Albrecht, C. Cid, J.-C
Faugère)
Linear Equations with Noise →
Noise-Free Algebraic Equations
A Gröbner Basis Algorithm for
BinaryErrorLWE
2 Gröbner Bases Techniques in
MPQC (joint work with L.
Bettale, and J.-C Faugère)
MinRank Attack on HFE
Solving MinRank
3 Real-Life Deployment of
Multivariate Cryptography
(joint work with J.-C Faugère)
W. Gröbner.
Overview
T. Matsumoto, H. Imai.
“Public Quadratic
Polynomial-Tuples for Efficient
Signature-Verification and
Message-Encryption”.
EUROCRYPT ’88.
Jacques Patarin.
Hidden Fields Equations (HFE)
and Isomorphisms of Polynomials
(IP): Two New Families of
Asymmetric Algorithms.
EUROCRYPT ’96.
Prof. Takagi Group
CryptoMathCREST project.
Jintai’s talk.
Multivariate Public-Key Cryptography
Family of schemes whose security is directly
related to the difficulty of PoSSo
Random instances of PoSSo are hard to
solve in practice
Many schemes proposed : HFE, UOV,
Rainbow, ZHFE, Gui (HFEv-) ,. . .
MinRank attack on HFE
Overview
T. Matsumoto, H. Imai.
“Public Quadratic
Polynomial-Tuples for Efficient
Signature-Verification and
Message-Encryption”.
EUROCRYPT ’88.
Jacques Patarin.
Hidden Fields Equations (HFE)
and Isomorphisms of Polynomials
(IP): Two New Families of
Asymmetric Algorithms.
EUROCRYPT ’96.
Prof. Takagi Group
CryptoMathCREST project.
Jintai’s talk.
Multivariate Public-Key Cryptography
Family of schemes whose security is directly
related to the difficulty of PoSSo
Random instances of PoSSo are hard to
solve in practice
Many schemes proposed : HFE, UOV,
Rainbow, ZHFE, Gui (HFEv-) ,. . .
MinRank attack on HFE
HFEBoost: Real-life deployment of
multivariate cryptography
Multivariate Public-Key Cryptography
Private-Key
f : (Fq)n → (Fq)n easy to invert.
f1(x1, . . . , xn),
...
...
fn(x1, . . . , xn).
S, T ∈ GLn(Fq).
Public-Key
p : (Fq)n → (Fq)n
p1(x1, . . . , xn),
...
...
pn(x1, . . . , xn).
p = T ◦ f ◦ S.
Multivariate Public-Key Cryptography
Private-Key
f : (Fq)n → (Fq)n easy to invert.
f1(x1, . . . , xn),
...
...
fn(x1, . . . , xn).
S, T ∈ GLn(Fq).
Public-Key
p : (Fq)n → (Fq)n
p1(x1, . . . , xn),
...
...
pn(x1, . . . , xn).
p = T ◦ f ◦ S.
Encrypt:
c = p(m).
Multivariate Public-Key Cryptography
Private-Key
f : (Fq)n → (Fq)n easy to invert.
f1(x1, . . . , xn),
...
...
fn(x1, . . . , xn).
S, T ∈ GLn(Fq).
Decrypt:
m = S−1
◦ f−1
◦ T−1
(c).
Public-Key
p : (Fq)n → (Fq)n
p1(x1, . . . , xn),
...
...
pn(x1, . . . , xn).
p = T ◦ f ◦ S.
Encrypt:
c = p(m).
HFE Trapdoor
Jacques Patarin.
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families
of Asymmetric Algorithms.
EUROCRYPT ’96.
HFE polynomial (q, prime)
Let D ∈ N.
F(X) =
0 i jn
qi +qj D
Ai,j Xqi +qj
+
0 in
qi D
Bi Xqi
+ C ∈ Fqn [X].
Decryption timings [J.-C. Faugère, Research Report, 2002]
Roots
(n, D) (80, 129) (80, 257) (80, 513) (128, 129) (128, 257) (128, 513)
NTL 0.6 s. 2.5 s. 6.4 s. 1.25 3.1 s. 9.05 s.
HFE Trapdoor
Jacques Patarin.
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families
of Asymmetric Algorithms.
EUROCRYPT ’96.
HFE polynomial (q, prime)
Let D ∈ N.
F(X) =
0 i jn
qi +qj D
Ai,j Xqi +qj
+
0 in
qi D
Bi Xqi
+ C ∈ Fqn [X].
F(X)
f1(x1, . . . , xn)
...
...
fn(x1, . . . , xn)
Some Known Attacks
Message recovery attack [Faugère, Joux, 2003]
First HFE challenge broken in 2002 (n = 80, q = 2, D = 96, 80 bits
security)
Theoretical degree of regularity ([L. Granboulan, A. Joux, J. Stern,
2006], [V. Dubois, N. Gamma, 2011], [J. Ding, T. Hodges, 2012], . . . )
Key recovery attack [A. Kipnis, A. Shamir, 1999, J. Ding, Schmidt,
Werner, 2008]
Weak keys [C. Bouillaguet, P.-A. Fouque, A. Joux, J. Treger, 2011]
Differential properties [T. Daniels, D. Smith-Tone]
. . .
Message Recovery Attack
[Faugère, Joux; L. Granboulan, A. Joux, J. Stern; V. Dubois, N.
Gamma; J. Ding, T. Hodges]
For any q:
Dreg = O logq(D) .
MinRank Attack on HFE
Outline
1 Algebraic Algorithms for LWE Problems (joint work with
M. Albrecht, C. Cid, J.-C Faugère)
Linear Equations with Noise → Noise-Free Algebraic Equations
A Gröbner Basis Algorithm for BinaryErrorLWE
2 Gröbner Bases Techniques in MPQC (joint work with L. Bettale,
and J.-C Faugère)
MinRank Attack on HFE
Solving MinRank
3 Real-Life Deployment of Multivariate Cryptography (joint work
with J.-C Faugère)
MinRank Attack on HFE
Rank Defect on F
Matrix Representation (non-standard quadratic form)
F(X) =
n−1
i=0
n−1
j=0
fi,j Xqi +qj
= XFXt
,
with X = (X, Xq, . . . , Xqn−1
).

More Related Content

What's hot

Mark Girolami's Read Paper 2010
Mark Girolami's Read Paper 2010Mark Girolami's Read Paper 2010
Mark Girolami's Read Paper 2010Christian Robert
 
Quantitative Propagation of Chaos for SGD in Wide Neural Networks
Quantitative Propagation of Chaos for SGD in Wide Neural NetworksQuantitative Propagation of Chaos for SGD in Wide Neural Networks
Quantitative Propagation of Chaos for SGD in Wide Neural NetworksValentin De Bortoli
 
Convolutional Neural Networks (DLAI D5L1 2017 UPC Deep Learning for Artificia...
Convolutional Neural Networks (DLAI D5L1 2017 UPC Deep Learning for Artificia...Convolutional Neural Networks (DLAI D5L1 2017 UPC Deep Learning for Artificia...
Convolutional Neural Networks (DLAI D5L1 2017 UPC Deep Learning for Artificia...Universitat Politècnica de Catalunya
 
Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...
Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...
Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...Universitat Politècnica de Catalunya
 
Machine Learning for Trading
Machine Learning for TradingMachine Learning for Trading
Machine Learning for TradingLarry Guo
 
Deep Generative Models I (DLAI D9L2 2017 UPC Deep Learning for Artificial Int...
Deep Generative Models I (DLAI D9L2 2017 UPC Deep Learning for Artificial Int...Deep Generative Models I (DLAI D9L2 2017 UPC Deep Learning for Artificial Int...
Deep Generative Models I (DLAI D9L2 2017 UPC Deep Learning for Artificial Int...Universitat Politècnica de Catalunya
 
Java and Deep Learning (Introduction)
Java and Deep Learning (Introduction)Java and Deep Learning (Introduction)
Java and Deep Learning (Introduction)Oswald Campesato
 
Continuous and Discrete-Time Analysis of SGD
Continuous and Discrete-Time Analysis of SGDContinuous and Discrete-Time Analysis of SGD
Continuous and Discrete-Time Analysis of SGDValentin De Bortoli
 
Bayesian Neural Networks
Bayesian Neural NetworksBayesian Neural Networks
Bayesian Neural Networksm.a.kirn
 
Dl1 deep learning_algorithms
Dl1 deep learning_algorithmsDl1 deep learning_algorithms
Dl1 deep learning_algorithmsArmando Vieira
 
Learning Financial Market Data with Recurrent Autoencoders and TensorFlow
Learning Financial Market Data with Recurrent Autoencoders and TensorFlowLearning Financial Market Data with Recurrent Autoencoders and TensorFlow
Learning Financial Market Data with Recurrent Autoencoders and TensorFlowAltoros
 
Gromov and the ”ergo-brain”
Gromov and the ”ergo-brain”Gromov and the ”ergo-brain”
Gromov and the ”ergo-brain”NeuroMat
 
Generative Adversarial Networks GAN - Santiago Pascual - UPC Barcelona 2018
Generative Adversarial Networks GAN - Santiago Pascual - UPC Barcelona 2018Generative Adversarial Networks GAN - Santiago Pascual - UPC Barcelona 2018
Generative Adversarial Networks GAN - Santiago Pascual - UPC Barcelona 2018Universitat Politècnica de Catalunya
 
Recurrent Neural Networks (D2L2 2017 UPC Deep Learning for Computer Vision)
Recurrent Neural Networks (D2L2 2017 UPC Deep Learning for Computer Vision)Recurrent Neural Networks (D2L2 2017 UPC Deep Learning for Computer Vision)
Recurrent Neural Networks (D2L2 2017 UPC Deep Learning for Computer Vision)Universitat Politècnica de Catalunya
 
Deep Learning: Recurrent Neural Network (Chapter 10)
Deep Learning: Recurrent Neural Network (Chapter 10) Deep Learning: Recurrent Neural Network (Chapter 10)
Deep Learning: Recurrent Neural Network (Chapter 10) Larry Guo
 
EM algorithm and its application in probabilistic latent semantic analysis
EM algorithm and its application in probabilistic latent semantic analysisEM algorithm and its application in probabilistic latent semantic analysis
EM algorithm and its application in probabilistic latent semantic analysiszukun
 

What's hot (20)

Mark Girolami's Read Paper 2010
Mark Girolami's Read Paper 2010Mark Girolami's Read Paper 2010
Mark Girolami's Read Paper 2010
 
Quantitative Propagation of Chaos for SGD in Wide Neural Networks
Quantitative Propagation of Chaos for SGD in Wide Neural NetworksQuantitative Propagation of Chaos for SGD in Wide Neural Networks
Quantitative Propagation of Chaos for SGD in Wide Neural Networks
 
Convolutional Neural Networks (DLAI D5L1 2017 UPC Deep Learning for Artificia...
Convolutional Neural Networks (DLAI D5L1 2017 UPC Deep Learning for Artificia...Convolutional Neural Networks (DLAI D5L1 2017 UPC Deep Learning for Artificia...
Convolutional Neural Networks (DLAI D5L1 2017 UPC Deep Learning for Artificia...
 
Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...
Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...
Recurrent Neural Networks I (D2L2 Deep Learning for Speech and Language UPC 2...
 
DL for molecules
DL for moleculesDL for molecules
DL for molecules
 
Machine Learning for Trading
Machine Learning for TradingMachine Learning for Trading
Machine Learning for Trading
 
Deep Generative Models I (DLAI D9L2 2017 UPC Deep Learning for Artificial Int...
Deep Generative Models I (DLAI D9L2 2017 UPC Deep Learning for Artificial Int...Deep Generative Models I (DLAI D9L2 2017 UPC Deep Learning for Artificial Int...
Deep Generative Models I (DLAI D9L2 2017 UPC Deep Learning for Artificial Int...
 
Java and Deep Learning (Introduction)
Java and Deep Learning (Introduction)Java and Deep Learning (Introduction)
Java and Deep Learning (Introduction)
 
Continuous and Discrete-Time Analysis of SGD
Continuous and Discrete-Time Analysis of SGDContinuous and Discrete-Time Analysis of SGD
Continuous and Discrete-Time Analysis of SGD
 
Bayesian Neural Networks
Bayesian Neural NetworksBayesian Neural Networks
Bayesian Neural Networks
 
Dl1 deep learning_algorithms
Dl1 deep learning_algorithmsDl1 deep learning_algorithms
Dl1 deep learning_algorithms
 
Learning Financial Market Data with Recurrent Autoencoders and TensorFlow
Learning Financial Market Data with Recurrent Autoencoders and TensorFlowLearning Financial Market Data with Recurrent Autoencoders and TensorFlow
Learning Financial Market Data with Recurrent Autoencoders and TensorFlow
 
Gromov and the ”ergo-brain”
Gromov and the ”ergo-brain”Gromov and the ”ergo-brain”
Gromov and the ”ergo-brain”
 
Generative Adversarial Networks GAN - Santiago Pascual - UPC Barcelona 2018
Generative Adversarial Networks GAN - Santiago Pascual - UPC Barcelona 2018Generative Adversarial Networks GAN - Santiago Pascual - UPC Barcelona 2018
Generative Adversarial Networks GAN - Santiago Pascual - UPC Barcelona 2018
 
Recurrent Neural Networks (D2L2 2017 UPC Deep Learning for Computer Vision)
Recurrent Neural Networks (D2L2 2017 UPC Deep Learning for Computer Vision)Recurrent Neural Networks (D2L2 2017 UPC Deep Learning for Computer Vision)
Recurrent Neural Networks (D2L2 2017 UPC Deep Learning for Computer Vision)
 
The Perceptron - Xavier Giro-i-Nieto - UPC Barcelona 2018
The Perceptron - Xavier Giro-i-Nieto - UPC Barcelona 2018The Perceptron - Xavier Giro-i-Nieto - UPC Barcelona 2018
The Perceptron - Xavier Giro-i-Nieto - UPC Barcelona 2018
 
Deep Learning: Recurrent Neural Network (Chapter 10)
Deep Learning: Recurrent Neural Network (Chapter 10) Deep Learning: Recurrent Neural Network (Chapter 10)
Deep Learning: Recurrent Neural Network (Chapter 10)
 
nn network
nn networknn network
nn network
 
EM algorithm and its application in probabilistic latent semantic analysis
EM algorithm and its application in probabilistic latent semantic analysisEM algorithm and its application in probabilistic latent semantic analysis
EM algorithm and its application in probabilistic latent semantic analysis
 
Multidimensional RNN
Multidimensional RNNMultidimensional RNN
Multidimensional RNN
 

Viewers also liked

Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptographyAkshay Shelake
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographySukhdeep Kaur
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographyPriya Winsome
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographySamy Shehata
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptographyMartins Okoi
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic EncryptionGöktuğ Serez
 
On complementarity in qec and quantum cryptography
On complementarity in qec and quantum cryptographyOn complementarity in qec and quantum cryptography
On complementarity in qec and quantum cryptographywtyru1989
 
Continuous variables quantum cryptography
Continuous variables quantum cryptographyContinuous variables quantum cryptography
Continuous variables quantum cryptographywtyru1989
 
Quantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksQuantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksArinto Murdopo
 
An affordable Quantum Cryptography system
An affordable Quantum Cryptography systemAn affordable Quantum Cryptography system
An affordable Quantum Cryptography systemRita Pizzi
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum CryptographyDarwin Gosal
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography dataKarthik Mohan
 
A Review on Quantum Cryptography Technology
A Review on Quantum Cryptography TechnologyA Review on Quantum Cryptography Technology
A Review on Quantum Cryptography Technologydrboon
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityKamal Diwakar
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum AbbasiIEEEP Karachi
 

Viewers also liked (20)

Quantum computer in cryptography
Quantum computer in cryptographyQuantum computer in cryptography
Quantum computer in cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Post quantum cryptography
Post quantum cryptographyPost quantum cryptography
Post quantum cryptography
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Quantum crypto
Quantum cryptoQuantum crypto
Quantum crypto
 
On complementarity in qec and quantum cryptography
On complementarity in qec and quantum cryptographyOn complementarity in qec and quantum cryptography
On complementarity in qec and quantum cryptography
 
Continuous variables quantum cryptography
Continuous variables quantum cryptographyContinuous variables quantum cryptography
Continuous variables quantum cryptography
 
Quantum Cryptography and Possible Attacks
Quantum Cryptography and Possible AttacksQuantum Cryptography and Possible Attacks
Quantum Cryptography and Possible Attacks
 
An affordable Quantum Cryptography system
An affordable Quantum Cryptography systemAn affordable Quantum Cryptography system
An affordable Quantum Cryptography system
 
Introduction to Quantum Cryptography
Introduction to Quantum CryptographyIntroduction to Quantum Cryptography
Introduction to Quantum Cryptography
 
quantumcrypto
quantumcryptoquantumcrypto
quantumcrypto
 
Quantum cryptography data
Quantum cryptography dataQuantum cryptography data
Quantum cryptography data
 
A Review on Quantum Cryptography Technology
A Review on Quantum Cryptography TechnologyA Review on Quantum Cryptography Technology
A Review on Quantum Cryptography Technology
 
Quantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic securityQuantum cryptography a modern cryptographic security
Quantum cryptography a modern cryptographic security
 
Ieeep By Quantum Abbasi
Ieeep By Quantum AbbasiIeeep By Quantum Abbasi
Ieeep By Quantum Abbasi
 
Quantum
QuantumQuantum
Quantum
 
quantum cryptography
quantum cryptographyquantum cryptography
quantum cryptography
 

Similar to Winter school-pq2016v2

Computational Complexity: Introduction-Turing Machines-Undecidability
Computational Complexity: Introduction-Turing Machines-UndecidabilityComputational Complexity: Introduction-Turing Machines-Undecidability
Computational Complexity: Introduction-Turing Machines-UndecidabilityAntonis Antonopoulos
 
Multi-Layer Perceptrons
Multi-Layer PerceptronsMulti-Layer Perceptrons
Multi-Layer PerceptronsESCOM
 
Hardness of approximation
Hardness of approximationHardness of approximation
Hardness of approximationcarlol
 
20110319 parameterized algorithms_fomin_lecture01-02
20110319 parameterized algorithms_fomin_lecture01-0220110319 parameterized algorithms_fomin_lecture01-02
20110319 parameterized algorithms_fomin_lecture01-02Computer Science Club
 
P, NP, NP-Complete, and NP-Hard
P, NP, NP-Complete, and NP-HardP, NP, NP-Complete, and NP-Hard
P, NP, NP-Complete, and NP-HardAnimesh Chaturvedi
 
An Unorthodox View on Memetic Algorithms
An Unorthodox View on Memetic AlgorithmsAn Unorthodox View on Memetic Algorithms
An Unorthodox View on Memetic AlgorithmsNatalio Krasnogor
 
Introduction - Lattice-based Cryptography
Introduction - Lattice-based CryptographyIntroduction - Lattice-based Cryptography
Introduction - Lattice-based CryptographyAlexandre Augusto Giron
 
DPPs everywhere: repulsive point processes for Monte Carlo integration, signa...
DPPs everywhere: repulsive point processes for Monte Carlo integration, signa...DPPs everywhere: repulsive point processes for Monte Carlo integration, signa...
DPPs everywhere: repulsive point processes for Monte Carlo integration, signa...Advanced-Concepts-Team
 
Asynchronous Stochastic Optimization, New Analysis and Algorithms
Asynchronous Stochastic Optimization, New Analysis and AlgorithmsAsynchronous Stochastic Optimization, New Analysis and Algorithms
Asynchronous Stochastic Optimization, New Analysis and AlgorithmsFabian Pedregosa
 
Machine Learning
Machine LearningMachine Learning
Machine Learningbutest
 
Accelerating Metropolis Hastings with Lightweight Inference Compilation
Accelerating Metropolis Hastings with Lightweight Inference CompilationAccelerating Metropolis Hastings with Lightweight Inference Compilation
Accelerating Metropolis Hastings with Lightweight Inference CompilationFeynman Liang
 
Time and space complexity
Time and space complexityTime and space complexity
Time and space complexityAnkit Katiyar
 
Applied machine learning for search engine relevance 3
Applied machine learning for search engine relevance 3Applied machine learning for search engine relevance 3
Applied machine learning for search engine relevance 3Charles Martin
 
A walk through the intersection between machine learning and mechanistic mode...
A walk through the intersection between machine learning and mechanistic mode...A walk through the intersection between machine learning and mechanistic mode...
A walk through the intersection between machine learning and mechanistic mode...JuanPabloCarbajal3
 
20230213_ComputerVision_연구.pptx
20230213_ComputerVision_연구.pptx20230213_ComputerVision_연구.pptx
20230213_ComputerVision_연구.pptxssuser7807522
 
[PR12] PR-036 Learning to Remember Rare Events
[PR12] PR-036 Learning to Remember Rare Events[PR12] PR-036 Learning to Remember Rare Events
[PR12] PR-036 Learning to Remember Rare EventsTaegyun Jeon
 

Similar to Winter school-pq2016v2 (20)

Computational Complexity: Introduction-Turing Machines-Undecidability
Computational Complexity: Introduction-Turing Machines-UndecidabilityComputational Complexity: Introduction-Turing Machines-Undecidability
Computational Complexity: Introduction-Turing Machines-Undecidability
 
Multi-Layer Perceptrons
Multi-Layer PerceptronsMulti-Layer Perceptrons
Multi-Layer Perceptrons
 
MUMS Opening Workshop - An Overview of Reduced-Order Models and Emulators (ED...
MUMS Opening Workshop - An Overview of Reduced-Order Models and Emulators (ED...MUMS Opening Workshop - An Overview of Reduced-Order Models and Emulators (ED...
MUMS Opening Workshop - An Overview of Reduced-Order Models and Emulators (ED...
 
Statistical Physics Studies of Machine Learning Problems by Lenka Zdeborova, ...
Statistical Physics Studies of Machine Learning Problems by Lenka Zdeborova, ...Statistical Physics Studies of Machine Learning Problems by Lenka Zdeborova, ...
Statistical Physics Studies of Machine Learning Problems by Lenka Zdeborova, ...
 
Hardness of approximation
Hardness of approximationHardness of approximation
Hardness of approximation
 
20110319 parameterized algorithms_fomin_lecture01-02
20110319 parameterized algorithms_fomin_lecture01-0220110319 parameterized algorithms_fomin_lecture01-02
20110319 parameterized algorithms_fomin_lecture01-02
 
P, NP, NP-Complete, and NP-Hard
P, NP, NP-Complete, and NP-HardP, NP, NP-Complete, and NP-Hard
P, NP, NP-Complete, and NP-Hard
 
Automatic bayesian cubature
Automatic bayesian cubatureAutomatic bayesian cubature
Automatic bayesian cubature
 
An Unorthodox View on Memetic Algorithms
An Unorthodox View on Memetic AlgorithmsAn Unorthodox View on Memetic Algorithms
An Unorthodox View on Memetic Algorithms
 
Triggering patterns of topology changes in dynamic attributed graphs
Triggering patterns of topology changes in dynamic attributed graphsTriggering patterns of topology changes in dynamic attributed graphs
Triggering patterns of topology changes in dynamic attributed graphs
 
Introduction - Lattice-based Cryptography
Introduction - Lattice-based CryptographyIntroduction - Lattice-based Cryptography
Introduction - Lattice-based Cryptography
 
DPPs everywhere: repulsive point processes for Monte Carlo integration, signa...
DPPs everywhere: repulsive point processes for Monte Carlo integration, signa...DPPs everywhere: repulsive point processes for Monte Carlo integration, signa...
DPPs everywhere: repulsive point processes for Monte Carlo integration, signa...
 
Asynchronous Stochastic Optimization, New Analysis and Algorithms
Asynchronous Stochastic Optimization, New Analysis and AlgorithmsAsynchronous Stochastic Optimization, New Analysis and Algorithms
Asynchronous Stochastic Optimization, New Analysis and Algorithms
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
Accelerating Metropolis Hastings with Lightweight Inference Compilation
Accelerating Metropolis Hastings with Lightweight Inference CompilationAccelerating Metropolis Hastings with Lightweight Inference Compilation
Accelerating Metropolis Hastings with Lightweight Inference Compilation
 
Time and space complexity
Time and space complexityTime and space complexity
Time and space complexity
 
Applied machine learning for search engine relevance 3
Applied machine learning for search engine relevance 3Applied machine learning for search engine relevance 3
Applied machine learning for search engine relevance 3
 
A walk through the intersection between machine learning and mechanistic mode...
A walk through the intersection between machine learning and mechanistic mode...A walk through the intersection between machine learning and mechanistic mode...
A walk through the intersection between machine learning and mechanistic mode...
 
20230213_ComputerVision_연구.pptx
20230213_ComputerVision_연구.pptx20230213_ComputerVision_연구.pptx
20230213_ComputerVision_연구.pptx
 
[PR12] PR-036 Learning to Remember Rare Events
[PR12] PR-036 Learning to Remember Rare Events[PR12] PR-036 Learning to Remember Rare Events
[PR12] PR-036 Learning to Remember Rare Events
 

Recently uploaded

TOTAL CHOLESTEROL (lipid profile test).pptx
TOTAL CHOLESTEROL (lipid profile test).pptxTOTAL CHOLESTEROL (lipid profile test).pptx
TOTAL CHOLESTEROL (lipid profile test).pptxdharshini369nike
 
Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2John Carlo Rollon
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
Call Girls in Hauz Khas Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Hauz Khas Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Hauz Khas Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Hauz Khas Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxpriyankatabhane
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSarthak Sekhar Mondal
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett SquareIsiahStephanRadaza
 
Welcome to GFDL for Take Your Child To Work Day
Welcome to GFDL for Take Your Child To Work DayWelcome to GFDL for Take Your Child To Work Day
Welcome to GFDL for Take Your Child To Work DayZachary Labe
 
Heredity: Inheritance and Variation of Traits
Heredity: Inheritance and Variation of TraitsHeredity: Inheritance and Variation of Traits
Heredity: Inheritance and Variation of TraitsCharlene Llagas
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsssuserddc89b
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxpriyankatabhane
 
Temporomandibular joint Muscles of Mastication
Temporomandibular joint Muscles of MasticationTemporomandibular joint Muscles of Mastication
Temporomandibular joint Muscles of Masticationvidulajaib
 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptArshadWarsi13
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 

Recently uploaded (20)

TOTAL CHOLESTEROL (lipid profile test).pptx
TOTAL CHOLESTEROL (lipid profile test).pptxTOTAL CHOLESTEROL (lipid profile test).pptx
TOTAL CHOLESTEROL (lipid profile test).pptx
 
Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2Evidences of Evolution General Biology 2
Evidences of Evolution General Biology 2
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
Call Girls in Hauz Khas Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Hauz Khas Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Hauz Khas Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Hauz Khas Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
 
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatidSpermiogenesis or Spermateleosis or metamorphosis of spermatid
Spermiogenesis or Spermateleosis or metamorphosis of spermatid
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett Square
 
Welcome to GFDL for Take Your Child To Work Day
Welcome to GFDL for Take Your Child To Work DayWelcome to GFDL for Take Your Child To Work Day
Welcome to GFDL for Take Your Child To Work Day
 
Heredity: Inheritance and Variation of Traits
Heredity: Inheritance and Variation of TraitsHeredity: Inheritance and Variation of Traits
Heredity: Inheritance and Variation of Traits
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physics
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptx
 
Temporomandibular joint Muscles of Mastication
Temporomandibular joint Muscles of MasticationTemporomandibular joint Muscles of Mastication
Temporomandibular joint Muscles of Mastication
 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.ppt
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Aiims Metro Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 

Winter school-pq2016v2

  • 1. Gröbner Bases Techniques in Post-Quantum Cryptography Ludovic Perret Sorbonne Universités, UPMC Univ Paris 06, INRIA Paris LIP6, PolSyS Project, Paris, France Post-Quantum Cryptography Winter School, Fukuoka, Japan
  • 2. Post-Quantum Revolution NIST aims to standardize quantum-resistant algorithms within 2020 Main challenge is to understand precisely the hardness. Codes- based (Tanja’s talk) hash-based (Andrea’s talk) Lattice- Based (Phong’s talk) MQ-based (Jintai’s talk)
  • 3. Post-Quantum Revolution Gröbner bases is a major tool for quantum resistant schemes Codes- based (Tanja’s talk) hash-based (Andrea’s talk) Lattice- Based (Phong’s talk) MQ-based (Jintai’s talk)
  • 4. Post-Quantum Revolution Codes- based (Tanja’s talk) hash-based (Andrea’s talk) Lattice- Based (Phong’s talk) MQ-based (Jintai’s talk) Multivariate : intrinsic tool Code-based : emerging tool J.-C. Faugère, V. Gauthier-Umana, A. Otmani, L. P., J.-P. Tillich. A Distinguisher for High Rate McEliece Cryptosystems. IEEE-IT 13. A. Couvreur, A. Otmani, J.-P. Tillich. Polynomial Time Attack on Wild McEliece over Quadratic Extensions. EUROCRYPT 2014. J.-C. Faugère, A. Otmani, L. P., F. De Portzamparc, J.-P. Tillich. Structural Cryptanalysis of McEliece Schemes with Compact Keys. DCC’2015. PQC’16 program (Rank codes, Polar Codes) LWE-based : new tool for asympt. hardness Hash-based : minor impact
  • 5. Algebraic Cryptanalysis Idea Model a cryptosystem as a set of algebraic equations Try to solve this system (code-based, multivariate based), or estimate the difficulty of solving (LWE) ⇒ Gaussian Elimination, Gröbner basis, SAT-solver. . . N. Courtois, J. Ding, J.-C. Faugère, W. Meier, J. Patarin, A. Shamir, B.-Y. Yang . . . Cryptosystem (+ messages, ciphertexts. . . ) 4 x2 + 5 x + 6 y2 + 3 y z + 5 y + 1, 5 x2 + x y + 2 x z + 6 z2 + 3 z + 3, 6 x z + 5 y2 + 2 y + 4 z2 + 6 z + 5 x = 4 y = 2 z = 0 Secret Modeling Solving
  • 6. Polynomial System Solving (PoSSo) q, size of field n, nb. of variables m, nb. of equations PoSSo Input. non-linear polynomials p1, . . . , pm ∈ Fq[x1, . . . , xn] Question. Find – if any – (z1, . . . , zn) ∈ Fn q such that:    p1(z1, . . . , zn) = 0, ... pm(z1, . . . , zn) = 0 . Remark PoSSo is NP-hard Random instances of PoSSo are hard to solve in practice.
  • 8. Methodology Difficulties Modeling : describe a cryptosystem as a set of algebraic of equations “universal” approach (PoSSo is NP-Hard) ⇒ several models are possible !!! Solving ⇒ Minimize the number of variables/degree ⇒ Maximize the number of equations Specificity cryptographic context Gröbner bases
  • 9. Gröbner Basis Linear system Non linear system   1(x1, . . . , xn) = 0 · · · m(x1, . . . , xn) = 0    p1(x1, . . . , xn) = 0 · · · pm(x1, . . . , xn) = 0 V = VecFq ( 1, . . . , m) I = f1, . . . , fm Gauss reduction of V Gröbner basis I Definition [B. Buchberger’1965] Let be a mon. ordering (LEX or DRL), and I ⊂ Fq[x1, . . . , xn]. G ⊂ I is a Gröbner basis iff: ∀f ∈ I ∃g ∈ G such that LeadingTerm (g) | LeadingTerm (f ).
  • 10. Zero-Dimensional Strategy p1(x1, . . . , xn) ... pm(x1, . . . , xn) Initial syst. ⇒compute GB g1(x1, . . . , xn) ... gs(xn) LEX-GB
  • 11. Zero-Dimensional Strategy p1(x1, . . . , xn) ... pm(x1, . . . , xn) Initial syst. ⇒compute GB g1(x1, . . . , xn) ... gr (x1, . . . , xn) DRL-GB ⇒change order g1(x1, . . . , xn) ... gs(xn) LEX-GB
  • 12. Computing a Gröbner Basis B. Buchberger “An Algorithm for Finding the Basis Elements of the Residue Class Ring of a Zero Dimensional Polynomial Ideal”, PhD thesis, 1965. J.-C. Faugère. “A New Efficient Algorithm for Computing Gröbner Bases (F4). Journal of Pure and Applied Algebra, 1999. J.-C. Faugère. “A New Efficient Algorithm for Computing Gröbner bases Without Reduction to Zero (F5).” ISSAC, 2002. . . . ... C. Eder and J.-C. Faugère. “A Survey on Signature-Based Gröbner Basis Computations”. ArXiv, April 2014. B. Buchberger.
  • 13. Computing a Gröbner Basis Macaulay Matrix Macaulay d,m of degree d p1, . . . , pm ∈ Fq[x1, . . . , xn] monomial ordering (LEX, or DRL) ti,j monomials of degree d − deg(fi ) mono. of deg. D sorted for t1,1 p1 t1,2 p1 ... tm,1 pm tm,2 pm ...            . . . . . . . . . . . . Coeff(t pi , ) . . . ... . . . . . . . . . . . . . . . . . .           
  • 14. Polynomial System Solving Macaulay matrix Macaulay d,m in degree d p1 = · · · = pm = 0 Gröbner: total degree Gröbner: lexicographical Gaussian Elimination of matrices up to degree Dreg O( n+Dreg n ω ) ˜O(#Sols3 ) •Buchberger (1965 •F4 (1999) •F5 (2002) • . . . •FGLM (1993) GB complexity is driven by the maximal degree Dreg reached
  • 15. GBLA GBLA team: B. Boyer, C. Eder, J.-C Faugère, F. Martani http://www-polsys.lip6.fr/~jcf/GBLA/index.html
  • 16. Complexity Degree of Regularity Let p1, . . . , pm ∈ Fq[x1, . . . , xn] be homogeneous polynomials. Dreg = mind dimK({p ∈ p1, . . . , pm | deg(p) = d}) = n + d − 1 d .
  • 17. Complexity Semi-Regular Sequence [Bardet, Faugère, Salvy, Yang, MEGA’2003] p1, . . . , pm ∈ Fq[x1, . . . , xn] (m > n) be hom. polynomials of degree d. If the system is semi-regular, then Dreg is the index of the first non-positive coeff. 0 d 0 hd zd = (1 − zd )m (1 − z)n
  • 18. hd rank defects of Macaulay d,m
  • 19. Only trivial relations pi pj = pj pi
  • 20. For non-homogenous polynomials, homogeneous part of highest degree
  • 21. Fröberg’s conjecture : semi-regular sequences exist ! Example (n = 5, m = 6, d = 2) 1 + 5 x + 9 x2 + 5 x3 − 4 x4 + . . .
  • 22. Complexity Asymptotic Expansion [Bardet, Faugère, Salvy, Yang, MEGA’2003] Let p1, . . . , pm ∈ Fq[x1, . . . , xn] be a semi-regular system of m = C · n quadratic equations with C > 1 a constant : Dreg ≈ C − 1 2 − C(C − 1) n.
  • 23. Complexity Global Picture [Bardet, Faugère, Salvy, Research Report, 2003] Let p1, . . . , pm ∈ Fq[x1, . . . , xn] be a semi-regular system of m quadratic equations:
  • 24. poly-time complexity if m = n+2 2 (Linearization bound)
  • 25. poly-time complexity for GB if m = n+1 2
  • 27. exponential complexity if m = O(n) or m = n + Cst
  • 28. Algebraic Algorithms for LWE Problems Plan 1 Algebraic Algorithms for LWE Problems (joint work with M. Albrecht, C. Cid, J.-C Faugère) Linear Equations with Noise → Noise-Free Algebraic Equations A Gröbner Basis Algorithm for BinaryErrorLWE 2 Gröbner Bases Techniques in MPQC (joint work with L. Bettale, and J.-C Faugère) MinRank Attack on HFE Solving MinRank 3 Real-Life Deployment of Multivariate Cryptography (joint work with J.-C Faugère) W. Gröbner.
  • 29. Algebraic Algorithms for LWE Problems Learning With Errors (LWE) LWE(α) Input. a random matrix G ∈ Fn×m q and c ∈ Fm q . Question. Find – if any – a secret (s1, . . . , sn) ∈ Fn q such that: error = c − (s1, . . . , sn) × G ∈ Fm q is “small ”.
  • 30. q ∈ poly(n), prime
  • 31. special error distribution s.t. | errori | αq q
  • 33. Connection to worst-case GAPSVP α · q √ n O. Regev. “On Lattices, Learning with Errors, Random Linear Codes, and Cryptography”. Journal of the ACM, 2009. Z. Brakerski, A. Langlois, C. Peikert, O. Regev, D. Stehlé. “Classical Hardness of Learning with Error”. STOC 2013.
  • 34. Algebraic Algorithms for LWE Problems LWE with Binary Errors BinaryErrorLWE Input. a random matrix G ∈ Fn×m q and c ∈ Fm q . Question. Find – if any – a secret (s1, . . . , sn) ∈ Fn q such that: error = c − (s1, . . . , sn) × G ∈ {0, 1}m . N. Döttling, J. Müller-Quade. “Lossy Codes and a New Variant of the Learning with Errors Problem”. Eurocrypt’13. D. Micciancio, C. Peikert. “Hardness of SIS and LWE with Small Parameters”. CRYPTO’13.
  • 35. Algebraic Algorithms for LWE Problems LWE with Binary Errors D. Micciancio, C. Peikert. “Hardness of SIS and LWE with Small Parameters”. CRYPTO’13. BinaryErrorLWE Input. a random matrix G ∈ Fn×m q and c ∈ Fm q . Question. Find – if any – a secret (s1, . . . , sn) ∈ Fn q such that: error = c − (s1, . . . , sn) × G ∈ {0, 1}m . Hardness Results Reduction from BinaryErrorLWE with m = n 1 + Ω 1/ log(n) to the worst-case Gap-SVP
  • 36. [Arora-Ge’10] Proven polynomial-time algorithm by linearization if m ∈ O(n2)
  • 37. Algebraic Algorithms for LWE Problems Algebraic Cryptanalysis Model BinaryErrorLWE as a set of non-linear equations ⇒ [Arora-Ge’10,] Linear Equations with noise to noise-free algebraic equations Solve this system and estimate the difficulty of solving ⇒ [Arora-Ge’10, Ding’10] Linearization ⇒ Complexity analysis with Gröbner bases under a genericity assumption ⇒ Hardness of BinaryErrorLWE for n 1 + Ω 1/ log(n) m O(n2 ). ⇒ Exp. speed up w.r.t. to Arora-Ge for LWE(α) S. Arora, and R. Ge. “New Algorithms for Learning in Presence of Error”. ICALP’11 Electronic Colloquium on Computational Complexity, April 2010. J. Ding. “Solving LWE Problem with Bounded Errors in Polynomial Time”. IACR Cryptology ePrint Archive, November 2010.
  • 38. Algebraic Algorithms for LWE Problems Plan 1 Algebraic Algorithms for LWE Problems (joint work with M. Albrecht, C. Cid, J.-C Faugère) Linear Equations with Noise → Noise-Free Algebraic Equations A Gröbner Basis Algorithm for BinaryErrorLWE 2 Gröbner Bases Techniques in MPQC (joint work with L. Bettale, and J.-C Faugère) MinRank Attack on HFE Solving MinRank 3 Real-Life Deployment of Multivariate Cryptography (joint work with J.-C Faugère)
  • 39. Algebraic Algorithms for LWE Problems Algebraic Modelling BinaryErrorLWE Input. a random matrix G ∈ Fn×m q , and c ∈ Fm q . Question. Find – if any – (s1, . . . , sn) ∈ Fn q such that: c − (s1, . . . , sn) × G = error ∈ {0, 1}m .
  • 40. m linear equations in n variables over Fq with binary noise.
  • 41. Algebraic Algorithms for LWE Problems Algebraic Modelling BinaryErrorLWE Input. a random matrix G ∈ Fn×m q , and c ∈ Fm q . Question. Find – if any – (s1, . . . , sn) ∈ Fn q such that: c − (s1, . . . , sn) × G = error ∈ {0, 1}m .
  • 42. m linear equations in n variables over Fq with binary noise. Arora-Ge (AG) Modelling Let P(X) = X(X − 1): p1 = P c1 − n j=1 sj Gj,1 = 0, . . . , pm = P cm − n j=1 sj Gj,m = 0.
  • 43. m quadratic equations in n variables over Fq.
  • 44. Algebraic Algorithms for LWE Problems Until Now P(X) = X(X − 1) ∈ Fq[X] be vanishing on the errors. AG Modelling Solving BinaryErrorLWE ≡ p1 = P c1 − n j=1 xj Gj,1 = 0, . . . , pm = P cm − n j=1 xj Gj,m = 0. AG algorithm BinaryErrorLWE: m quadratic equations in n variables over Fq. Linearisation → polynomial-time algo. when m = O(n2 ).
  • 45. Algebraic Algorithms for LWE Problems Linear Independence Theorem Let P(x) = X(X − 1). If q 2m, then for all m, 1 m n+1 2 : p1 = P c1 − n j=1 xj Gj,1 , . . . , pm = P cm − n j=1 xj Gj,m , are linearly independent with probability 1 − 2m q .
  • 46. Algebraic Algorithms for LWE Problems Linear Independence Proof. Mat: a sub-matrix of size m × m of the Macaulay matrix at degree 2 p(G) = Det(Mat). if p(G) is non-zero, then by Schwartz-Zippel-DeMillo-Lipton: PrG (p(G) = 0) 1 − 2m q . Find G∗ such that p(G∗) = 0:     1 1 1 1 0 0 0 0 0 0 0 1 0 0 1 1 1 0 0 0 0 0 1 0 0 1 0 1 1 0 0 0 0 1 0 0 1 0 1 1    
  • 47. Algebraic Algorithms for LWE Problems Plan 1 Algebraic Algorithms for LWE Problems (joint work with M. Albrecht, C. Cid, J.-C Faugère) Linear Equations with Noise → Noise-Free Algebraic Equations A Gröbner Basis Algorithm for BinaryErrorLWE 2 Gröbner Bases Techniques in MPQC (joint work with L. Bettale, and J.-C Faugère) MinRank Attack on HFE Solving MinRank 3 Real-Life Deployment of Multivariate Cryptography (joint work with J.-C Faugère)
  • 48. Algebraic Algorithms for LWE Problems Solving BinaryErrorLWE with Gröbner Bases Assumption Systems occurring in the AGD modelling are semi-regular.
  • 49. Rank condition on the Macaulay matrices.
  • 50. Algebraic Algorithms for LWE Problems Solving BinaryErrorLWE with Gröbner Bases Asymptotic Expansion Let p1, . . . , pm ∈ Fq[x1, . . . , xn] be a semi-regular system of m = C · n quadratic equations with C 1 : Dreg ≈ C − 1 2 − C(C − 1) n. Theorem Under the semi-regularity assumption:
  • 51. If m = n 1 + 1 log(n) , one can solve BinaryErrorLWE in O 23.25·n .
  • 52. If m = 2 · n, BinaryErrorLWE can be solved in O 21.02·n .
  • 53. If m = O (n log log n), one can solve BinaryErrorLWE in O 2 3n log log log n 8 log log n .
  • 54. Algebraic Algorithms for LWE Problems About the Assumption Assumption Systems occurring in the Arora-Ge modelling are semi-regular.
  • 55. Rank condition on the Macaulay matrices. Magma 2.19 Dreg Dreal Time n ∈ {5, . . . , 25} m = n · log2(n) 3 3 24 sec. n ∈ {26, . . . , 53} m = n · log2(n) 4 4 6 days n = 60 m = 709 2 n log2(n) 3 3 32 min. n = 100 m = 1728 2.6 n log2(n) 3 3 40 h.
  • 56. Algebraic Algorithms for LWE Problems About the Assumption Assumption Systems occurring in the Arora-Ge modelling are semi-regular.
  • 57. Rank condition on the Macaulay matrices. Full proof of the assumption ≡ proving the well known Fröberg’s conjecture Semi-regularity of powers of generic linear forms [R. Fröberg, J. Hollman, JSC’94] Assumption proved in restricted cases M. Albrecht, C. Cid, J.-C Faugère, L. Perret. “Algebraic Algorithms for LWE”. IACR Eprint, 2014. Similar analysis for LWE(α) ⇒ Exp. speed up w.r.t. to Arora-Ge for LWE(α)
  • 58. Plan 1 Algebraic Algorithms for LWE Problems (joint work with M. Albrecht, C. Cid, J.-C Faugère) Linear Equations with Noise → Noise-Free Algebraic Equations A Gröbner Basis Algorithm for BinaryErrorLWE 2 Gröbner Bases Techniques in MPQC (joint work with L. Bettale, and J.-C Faugère) MinRank Attack on HFE Solving MinRank 3 Real-Life Deployment of Multivariate Cryptography (joint work with J.-C Faugère) W. Gröbner.
  • 59. Overview T. Matsumoto, H. Imai. “Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption”. EUROCRYPT ’88. Jacques Patarin. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms. EUROCRYPT ’96. Prof. Takagi Group CryptoMathCREST project. Jintai’s talk. Multivariate Public-Key Cryptography Family of schemes whose security is directly related to the difficulty of PoSSo Random instances of PoSSo are hard to solve in practice Many schemes proposed : HFE, UOV, Rainbow, ZHFE, Gui (HFEv-) ,. . . MinRank attack on HFE
  • 60. Overview T. Matsumoto, H. Imai. “Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption”. EUROCRYPT ’88. Jacques Patarin. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms. EUROCRYPT ’96. Prof. Takagi Group CryptoMathCREST project. Jintai’s talk. Multivariate Public-Key Cryptography Family of schemes whose security is directly related to the difficulty of PoSSo Random instances of PoSSo are hard to solve in practice Many schemes proposed : HFE, UOV, Rainbow, ZHFE, Gui (HFEv-) ,. . . MinRank attack on HFE HFEBoost: Real-life deployment of multivariate cryptography
  • 61. Multivariate Public-Key Cryptography Private-Key f : (Fq)n → (Fq)n easy to invert. f1(x1, . . . , xn), ... ... fn(x1, . . . , xn). S, T ∈ GLn(Fq). Public-Key p : (Fq)n → (Fq)n p1(x1, . . . , xn), ... ... pn(x1, . . . , xn). p = T ◦ f ◦ S.
  • 62. Multivariate Public-Key Cryptography Private-Key f : (Fq)n → (Fq)n easy to invert. f1(x1, . . . , xn), ... ... fn(x1, . . . , xn). S, T ∈ GLn(Fq). Public-Key p : (Fq)n → (Fq)n p1(x1, . . . , xn), ... ... pn(x1, . . . , xn). p = T ◦ f ◦ S. Encrypt: c = p(m).
  • 63. Multivariate Public-Key Cryptography Private-Key f : (Fq)n → (Fq)n easy to invert. f1(x1, . . . , xn), ... ... fn(x1, . . . , xn). S, T ∈ GLn(Fq). Decrypt: m = S−1 ◦ f−1 ◦ T−1 (c). Public-Key p : (Fq)n → (Fq)n p1(x1, . . . , xn), ... ... pn(x1, . . . , xn). p = T ◦ f ◦ S. Encrypt: c = p(m).
  • 64. HFE Trapdoor Jacques Patarin. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms. EUROCRYPT ’96. HFE polynomial (q, prime) Let D ∈ N. F(X) = 0 i jn qi +qj D Ai,j Xqi +qj + 0 in qi D Bi Xqi + C ∈ Fqn [X]. Decryption timings [J.-C. Faugère, Research Report, 2002] Roots (n, D) (80, 129) (80, 257) (80, 513) (128, 129) (128, 257) (128, 513) NTL 0.6 s. 2.5 s. 6.4 s. 1.25 3.1 s. 9.05 s.
  • 65. HFE Trapdoor Jacques Patarin. Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms. EUROCRYPT ’96. HFE polynomial (q, prime) Let D ∈ N. F(X) = 0 i jn qi +qj D Ai,j Xqi +qj + 0 in qi D Bi Xqi + C ∈ Fqn [X]. F(X) f1(x1, . . . , xn) ... ... fn(x1, . . . , xn)
  • 66. Some Known Attacks Message recovery attack [Faugère, Joux, 2003] First HFE challenge broken in 2002 (n = 80, q = 2, D = 96, 80 bits security) Theoretical degree of regularity ([L. Granboulan, A. Joux, J. Stern, 2006], [V. Dubois, N. Gamma, 2011], [J. Ding, T. Hodges, 2012], . . . ) Key recovery attack [A. Kipnis, A. Shamir, 1999, J. Ding, Schmidt, Werner, 2008] Weak keys [C. Bouillaguet, P.-A. Fouque, A. Joux, J. Treger, 2011] Differential properties [T. Daniels, D. Smith-Tone] . . .
  • 67. Message Recovery Attack [Faugère, Joux; L. Granboulan, A. Joux, J. Stern; V. Dubois, N. Gamma; J. Ding, T. Hodges] For any q: Dreg = O logq(D) .
  • 68. MinRank Attack on HFE Outline 1 Algebraic Algorithms for LWE Problems (joint work with M. Albrecht, C. Cid, J.-C Faugère) Linear Equations with Noise → Noise-Free Algebraic Equations A Gröbner Basis Algorithm for BinaryErrorLWE 2 Gröbner Bases Techniques in MPQC (joint work with L. Bettale, and J.-C Faugère) MinRank Attack on HFE Solving MinRank 3 Real-Life Deployment of Multivariate Cryptography (joint work with J.-C Faugère)
  • 69. MinRank Attack on HFE Rank Defect on F Matrix Representation (non-standard quadratic form) F(X) = n−1 i=0 n−1 j=0 fi,j Xqi +qj = XFXt , with X = (X, Xq, . . . , Xqn−1 ).
  • 70. MinRank Attack on HFE Rank Defect on F Matrix Representation (non-standard quadratic form) F(X) = n−1 i=0 n−1 j=0 fi,j Xqi +qj = XFXt , with X = (X, Xq, . . . , Xqn−1 ).           f1,1 . . . f1, 0 . . . 0 ... · · · ... ... · · · ... f ,1 . . . f , 0 . . . 0 0 . . . 0 0 . . . 0 ... · · · ... ... · · · ... 0 . . . 0 0 . . . 0           qi + qj D rank(F) = logq (deg (F(X))). A. Kipnis and A. Shamir. Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. CRYPTO ’99.
  • 71. MinRank Attack on HFE Rank Defects on the Public-key Use directly the public quadratic forms (p1, . . . , pn). Matrix Representation of Quadratic Form p1(x1, . . . , xn) = x G1 xt ... pn(x1, . . . , xn) = x Gn xt , with x = (x1, . . . , xn). L. Bettale, J.-C. Faugère, L. P. Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants. PKC 2011. L. Bettale, J.-C. Faugère, L. P. Cryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic. DCC, 2012.
  • 72. MinRank Attack on HFE Linear change of basis between (x1, . . . , xn) and (Xq0 , . . . , Xqn−1 ) Proposition Let (θ1, . . . , θn) ∈ (Fqn )n be a basis of Fqn over Fq. Mn =       θ1 θq 1 . . . θqn−1 1 θ2 θq 2 ... ... ... ... θn θq n . . . θqn−1 n       ∈ Mn×n (Fqn ) . For V = n i=1 vi θi ∈ Fqn : (v1, . . . , vn) Mn = (V , V q , . . . , V qn−1 ).
  • 73. MinRank Attack on HFE Improvement of Kipnis-Shamir’s Attack We write p = T ◦ f ◦ S and F(X) = n−1 i=0 n−1 j=0 fi,j Xqi +qj . Let Mn        θ1 θq 1 . . . θqn−1 1 θ2 θq 2 ... ... ... ... θn θq n . . . θqn−1 n        ∈ Mn×n (Fqn ) . We have: xMn = (x1, . . . , xn)Mn = (X, Xq , . . . , Xqn−1 ), with X = n i=1 xi θi ∈ Fqn . We define pk(x) = x Gk xt, T−1Mn = U = [ui,j ], and S Mn = W. Fundamental Equation [L. Bettale, J.-C. Faugère, L. P., DCC’12] n k=1 uk,0Gk+1 = WFWt ,
  • 74. MinRank Attack on HFE Improvement of Kipnis-Shamir’s Attack We write p = T ◦ f ◦ S and F(X) = n−1 i=0 n−1 j=0 fi,j Xqi +qj . Fundamental Equation [L. Bettale, J.-C. Faugère, L. P., DCC’12] n k=1 uk,0Gk+1 = WFWt , MinRank ([N. Courtois, 2001], [W. Buss, G. Frandsen, J. Shallit, 1999]) G0, . . . , Gn−1 ∈ Mn,n(Fq) and r 0, find (λ1, . . . , λn) ∈ (Fq)n s.t. rank n k=1 λkGk = r. MinRank in NP-hard
  • 75. Solving MinRank Outline 1 Algebraic Algorithms for LWE Problems (joint work with M. Albrecht, C. Cid, J.-C Faugère) Linear Equations with Noise → Noise-Free Algebraic Equations A Gröbner Basis Algorithm for BinaryErrorLWE 2 Gröbner Bases Techniques in MPQC (joint work with L. Bettale, and J.-C Faugère) MinRank Attack on HFE Solving MinRank 3 Real-Life Deployment of Multivariate Cryptography (joint work with J.-C Faugère)
  • 76. Solving MinRank Solving MinRank – Kernel Approach A. Kipnis, A. Shamir. Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization. CRYPTO 99. The goal is to find λ = (λ1, . . . , λn) ∈ Fn q s. t. : rank   n j=1 λj Mj   = r. Eλ = n j=1 λj Mj : Rk(Eλ) = r ⇔ ∃(n − r) linearly indep. vectors X(i) ∈ Ker(Eλ).   n j=1 λj Mj   X(i) = 0n, ∀1 i n − r.
  • 77. Solving MinRank Kernel Attack – (II) Eλ = n j=1 λj Mj . Rk(Eλ) = r ⇔ ∃(n − r) linearly indep. vectors X(i) ∈ Ker(Eλ). Let X(i) = (x (i) 1 , . . . , x (i) n ), where x (i) j s are variables. Then :   k j=1 yj Mj         x (1) 1 · · · x (n−r) 1 x (1) 2 · · · x (n−r) 2 ... ... ... x (1) n · · · x (n−r) n       =      0 · · · 0 0 · · · 0 ... ... ... 0 · · · 0     
  • 78. Solving MinRank Kernel Attack – (III) Write X(i) = (ei , x (i) 1 , . . . , x (i) r ) , where ei ∈ Fn−r q and x (i) j s are var.   k j=1 yj Mj               1 0 · · · 0 0 1 · · · 0 ... ... ... ... 0 0 · · · 1 x (1) 1 · · · · · · x (n−r) 1 ... ... ... ... x (1) r · · · · · · x (n−r) r             =      0 · · · 0 0 · · · 0 ... ... ... 0 · · · 0      Kernel attack [N. Courtois, L. Goubin, 2000], exhaustive search on the kernel, O(q n r (n−r) )
  • 79. Solving MinRank Kernel Attack – (III) Write X(i) = (ei , x (i) 1 , . . . , x (i) r ) , where ei ∈ Fn−r q and x (i) j s are var.   k j=1 yj Mj               1 0 · · · 0 0 1 · · · 0 ... ... ... ... 0 0 · · · 1 x (1) 1 · · · · · · x (n−r) 1 ... ... ... ... x (1) r · · · · · · x (n−r) r             =      0 · · · 0 0 · · · 0 ... ... ... 0 · · · 0      Kernel attack [N. Courtois, L. Goubin, 2000], exhaustive search on the kernel, O(q n r (n−r) ) quadratic system of (n − r)n equations in r(n − r) + n unknowns. J.-C. Faugère, F. Levy-dit-Vehel, L P. Cryptanalysis of MinRank. Crypto 2008.
  • 80. Solving MinRank Solving MinRank G = n i=1 λkGi, n: size of the matrices, r: target rank Kipnis-Shamir modeling Rank(G) = r ⇔ ∃x(1), . . . , x(n−r) ∈ Ker(G). G·          In−r x (1) 1 . . . x (n−r) 1 ... ... ... x (1) r . . . x (n−r) r          = 0 n(n − r) multilinear equations. r(n − r) + k variables.
  • 81. Solving MinRank Solving MinRank G = n i=1 λkGi, n: size of the matrices, r: target rank Kipnis-Shamir modeling Rank(G) = r ⇔ ∃x(1), . . . , x(n−r) ∈ Ker(G). G·          In−r x (1) 1 . . . x (n−r) 1 ... ... ... x (1) r . . . x (n−r) r          = 0 n(n − r) multilinear equations. r(n − r) + k variables. Minors modeling Rank(G) = r all minors of size (r + 1) of G vanish. n r+1 2 equations of degree r + 1. k variables. Few variables, lots of equations, high de- gree
  • 82. Solving MinRank Solving MinRank G = n i=1 λkGi, n: size of the matrices, r: target rank Kipnis-Shamir modeling Rank(G) = r ⇔ ∃x(1), . . . , x(n−r) ∈ Ker(G). G·          In−r x (1) 1 . . . x (n−r) 1 ... ... ... x (1) r . . . x (n−r) r          = 0 n(n − r) multilinear equations. r(n − r) + k variables. Minors modeling Rank(G) = r all minors of size (r + 1) of G vanish. n r+1 2 equations of degree r + 1. k variables. Few variables, lots of equations, high de- gree J.-C. Faugère, M. Safey El Din, P.-J. Spaenlehauer. Computing Loci of Rank Defects of Linear Matrices using Gröbner Bases and Applications to Cryptology. ISSAC 2010.
  • 83. Solving MinRank Complexity Analysis – Minors Proposition Let (n, k, r) be the parameters of MinRank and A(t) = [ai,j (t)] be the (r × r)-matrix defined by ai,j (t) = n−max(i,j) =0 n − i n − j t . The degree of regularity of MinRank polynomial systems is the index of the first 0 coefficient in: (1 − t)(n−r)2−k det A(t) t(r 2) . J.-C. Faugère, M. Safey El Din, P.-J. Spaenlehauer. Computing Loci of Rank Defects of Linear Matrices using Gröbner Bases and Applications to Cryptology. ISSAC 2010.
  • 84. Solving MinRank Solving HFE with MinRank log(CGb) = O(dreg) Explicit method to compute dreg ≡ Explicit method to bound the complexity of the Gröbner basis computation. Theorem [L. Bettale, J.-C. Faugère, L. P., DCC’12] Under a genericity assumption, the complexity of solving the MinRank on a HFE with secret polynomial of degree D with Gröbner bases: O n(logq (D)+1) ω , with 2 ω 3 the linear algebra constant. Conclusion All known attacks against HFE are exponential in D.
  • 85. Plan 1 Algebraic Algorithms for LWE Problems (joint work with M. Albrecht, C. Cid, J.-C Faugère) Linear Equations with Noise → Noise-Free Algebraic Equations A Gröbner Basis Algorithm for BinaryErrorLWE 2 Gröbner Bases Techniques in MPQC (joint work with L. Bettale, and J.-C Faugère) MinRank Attack on HFE Solving MinRank 3 Real-Life Deployment of Multivariate Cryptography (joint work with J.-C Faugère)
  • 86. Context PoC android application tested by French army Key-Exchange with MPKC Technology transfer Mobile dev. compagny Experiments on the battlefield
  • 87. Is HFE Broken ? Conclusion All known attacks against HFE are exponential in D. Decryption timings [J.-C. Faugère, Research Report, 2002] Roots (n, D) (80, 129) (80, 257) (80, 513) (128, 129) (128, 257) (128, 513) NTL 0.6 s. 2.5 s. 6.4 s. 1.25 3.1 s. 9.05 s.
  • 88. Is HFE Broken ? Conclusion All known attacks against HFE are exponential in D. Decryption timings [J.-C. Faugère, Research Report, 2002] Roots (n, D) (80, 129) (80, 257) (80, 513) (128, 129) (128, 257) (128, 513) NTL 0.6 s. 2.5 s. 6.4 s. 1.25 3.1 s. 9.05 s. Decryption timings [My laptop, 2016] (n, D) (80, 129) (80, 257) (80, 513) (128, 129) (128, 257) (128, 513) Magma 2.19 0.04 s. 0.09 s. 0.260 s. 0.05 s 0.12 s. 0.320 s.
  • 89. Is HFE Broken ? Conclusion All known attacks against HFE are exponential in D. Decryption timings [My laptop, 2016] (n, D) (80, 129) (80, 257) (80, 513) (128, 129) (128, 257) (128, 513) Magma 2.19 0.04 s. 0.09 s. 0.260 s. 0.05 s 0.12 s. 0.320 s. [J.-C. Faugère, A. Joux, 2003] The main result is that when the degree D of the secret polynomial is fixed, the cryptanalysis of an HFE system requires polynomial time in the number of variables. Of course, if D and n are large enough, the cryptanalysis may still be out of practical reach.
  • 90. HFEBoost Characteristics HFE-, public-key size : 130 KB for 80 bits of security Dedicated ARM implementation of RootFinding (J.-C. Faugère) Patent in process Enc. Dec. Samsung Galaxy S5 mili s. 0.72 s. Samsung Galaxy S6 (32 bits) mili. s. 0.49 s. Laptop (MAC) milli. s. 0.18 s.
  • 91. Conclusion MPKC is practical, good understanding of the security HFEBoost, early stage startup project looking for more real-life experiments jean-charles.faugere@inria.fr ludovic.perret@lip6.fr