Documente Academic
Documente Profesional
Documente Cultură
Project Report
Participants- Savni Bhatt
Naman Hajela
Eshan Singh
Kabir Maini
1
Acknowledgements
We owe this report to the school principal Mr. Winston Gomez.
We acknowledge the efforts of the school management for
helping us create this report. This report is an outcome of the
guidance by our mentors Mr. Jinendra Jain, H.O.D mathematics
and Mr. Swapnil Karnik. We are grateful to our friends who
believed in our abilities and read this report to rectify errors and
recommended changes. We thank each other as teammates for
cooperating and supporting one another for the creation of this
project report.
We also express our gratitude to Sahodaya Schools Complex and
Senior Bal Vigyan for providing us students a platform to
showcase our ideas for a Digital and Technological solution for a
better tomorrow through this project report.
2
Certificate
3
CONTENTS
≻ Introduction
≻ Need for vector lattice cryptography
≻ Current encryption methods
≻ R SA ENCRYPTION ALGORITHM
≻ HOW DOES RSA WORK
≻ THREAT TO TODAY’S ENCRYPTION
≻ WHAT IS LATTICE BASED CRYPTOGRAPHY
≻ What IS BASIS
≻ COLLISION RESISTANT HASH FUNCTION
≻ AUTHENTICITY OF LATTICE BASED CRYPTOGRAPHY
≻ CONCLUSION
≻ BIBLIOGRAPHY
4
Introduction
In this rapidly growing world where technology keeps advancing each and
every day, lattice based cryptography provides a salient method to
safeguard the privacy of individuals and organizations.
It is an efficient method to control suspicious activities of people who
attempt to invade the personal data of individuals without letting them
know.
Lattice-based cryptography is a generic term used to encompass a wide
range of cryptographic functions whose security is based on the
conjectured intractability of Lattice problems, like (variants of) the Shortest
Vector Problem and the Closest Vector Problems.
Understanding the importance of lattice based cryptography, we can look
forward to a safer future, evolving its security standards as the world
advances. This is not just an insurance of personal privacy, but it ensures a
safer digital world with enhanced National and International security.
5
Current encryption methods:
Unencrypted data, often referred to as plaintext, is encrypted
Symmetric-key ciphers, also referred to as "secret key," use a single
key, sometimes referred to as a shared secret because the system doing
the encryption must share it with any entity it intends to be able to decrypt
the encrypted data. The most widely used symmetric-key cipher is the
Advanced Encryption Standard (AES), which was designed to protect
government classified information.
Symmetric-key encryption is usually much f aster than asymmetric
encryption, but the sender must exchange the key used to encrypt the data
with the recipient before the recipient can perform decryption on the
cipher-text. The need to securely distribute and manage large numbers of
keys means most cryptographic processes use a symmetric algorithm to
efficiently encrypt data, but use an a
symmetric algorithm to securely
exchange the secret key.
Asymmetric cryptography, also known as public key
cryptography, uses two different but mathematically linked keys, one
public and one p rivate. The public key can be shared with everyone,
whereas the private key must be kept secret. The R SA encryption
algorithm is the most widely used public key algorithm, partly because
both the public and the private keys can encrypt a message; the opposite
key from the one used to encrypt a message is used to decrypt it. This
attribute provides a method of assuring not only confidentiality, but also
the integrity, authenticity and no reputability of electronic communications
and data at rest through the use of digital signatures.
8
NP-complete: These are the verifiable problems (NP) for which any other problem in NP can
be reduced to this problem in polynomial time. In other words, the problem X is
NP-complete if a problem Y in NP can be reduced to X in polynomial time.
And a problem is NP-hard if "it is at least as hard as the hardest problem in NP-complete".
However, neither do they have to be NP problems, nor decision problems. A problem X is
NP-hard, if there's a NP-complete problem Y such that Y can be reduced to X in polynomial
time.
Factoring numbers is an NP hard problem because there is no algorithm which can factor
large semi primes in polynomial time , and we use this to our advantage in the RSA
encryption algorithm.
9
10
Security Of RSA
• Relies on the fact that prime factorization is computationally very hard.
• Let q be the number of bits in the binary representation of n.
• No algorithm, polynomial in q, is known to find the prime factors of n.
• Try to find the factors of a 100 bit number.
That is, it is believed that the full decryption of an RSA cipher text is infeasible
because no efficient classical algorithm currently exists for factoring large
numbers. However, in 1994 Peter Shor showed that a quantum computer
could be used to factor a number in polynomial time, thus effectively
breaking RSA. It may be tempting to use the speed of a quantum computer to
simply check all possible divisors in parallel. In this case, we would be
performing a classical algorithm on a quantum computer, making use only of
the increased speed of the quantum machine.However, due to the nature of
quantum computing, when measuring the outcome of the computations, you
will get a random possible divisor, which is almost certainly not the one you
want.
11
How, then, can we use a quantum computer to solve the factoring problem? The key to a
fast and accurate quantum factoring algorithm is to make use of the structure of the
factoring problem itself. Instead of looking for factors directly, we must use some
mathematical property of factoring. Fortunately, the factoring problem has plenty of special
properties from which to choose. For example, given a positive integer, even if we do not
know its prime factorization we do know that it has exactly one factorization. This fact does
not help us solve the factorization problem, but it does give us hope that the problem has
other nice mathematical properties that will. By the use of such mathematical properties of
numbers, we can design nice quantum algorithms for factoring numbers hence making
today’s encryption vulnerable.After Peter Shor showed that it is possible to factor numbers
in polynomial time it has become quite easy to design quantum applicable algorithms
exploiting the mathematical properties of numbers and factoring
Use of Lattices:
So what are lattices? A lattice can basically be thought of as any
regularly spaced grid of points stretching out to infinity. For example,
here are 2 different, 2-dimensional lattices.
13
WHAT IS A BASIS:
14
16
17
Lattices, SVP and CVP, have been intensively studied for more than 100
years, both as intrinsic mathematical problems and for applications in pure
and applied mathematics, physics and cryptography. The theoretical study
of lattices is often called the Geometry of Numbers,
The practical process of finding close vectors in lattices is called Lattice
Reduction.
ONE MORE SUCH HARD PROBLEM IS THE “LEARNING WITH ERROR”.
If something is as hard to solve as the LWE problem it can be termed as its
equivalent
18
Cryptographic system:
(modeling the hardness of the LWE problem)
Alice is receiving data:
A is a public matrix of dimensions mxn , all entries of the matrix is actually
taken mod(q) where q is a large integer which is also public
Alice calculates which is his public key , now this is a hash function
Bob. has to send his data and he has and he generates a private
vector - S ..
Conclusion:
Understanding the importance of lattice based
cryptography, we can
now look forward to a safer future, evolving its security
standards as
the world advances. This is not just an insurance of
personal privacy,
but it ensures a safer digital world with enhanced
National and International security.
21
Bibliography
https://math.ucalgary.ca/ecc/files/ecc/u5/Micciancio_EC
C2009.pdf
http://www.dev.ime.unicamp.br/lawci/slides/workshop
/latticesfor.pdf
https://www.math.brown.edu/~jhs/Presentations/Wyo
mingLattices.pdf
https://eprint.iacr.org/2015/938.pdf
https://crypto.stanford.edu/cs355/18sp/lec9.pdf
http://people.csail.mit.edu/cpeikert/pubs/shorter.pdf
https://courses.engr.illinois.edu/cs598man/fa2014/slid
es/24.pdf
www.wikipedia.org
https://math.ucalgary.ca/ecc/files/ecc/u5/Micciancio_EC
C2009.pdf