Skip to main content

Salsa Picante: A Machine Learning Attack On LWE with Binary Secrets

Publication ,  Conference
Li, CY; Malhou, M; Sotáková, J; Garcelon, E; Lauter, K; Wenger, E; Charton, F
Published in: CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
November 15, 2023

Learning With Errors (LWE) is a hard math problem underpinning many proposed post-quantum cryptographic (PQC) systems. The only PQC Key Exchange Mechanism (KEM) standardized by NIST [13] is based on module LWE, and current publicly available PQ Homomorphic Encryption (HE) libraries are based on ring LWE [2]. The security of LWE-based PQ cryptosystems is critical, but certain implementation choices could weaken them. One such choice is sparse binary secrets, desirable for PQ HE schemes for efficiency reasons. Prior work Salsa [51] demonstrated a machine learning-based attack on LWE with sparse binary secrets in small dimensions (n ≤ 128) and low Hamming weights (h ≤ 4). However, this attack assumes access to millions of eavesdropped LWE samples and fails at higher Hamming weights or dimensions. We present Picante, an enhanced machine learning attack on LWE with sparse binary secrets, which recovers secrets in much larger dimensions (up to n = 350) and with larger Hamming weights (roughly n/10, and up to h = 60 for n = 350). We achieve this dramatic improvement via a novel preprocessing step, which allows us to generate training data from a linear number of eavesdropped LWE samples (4n) and changes the distribution of the data to improve transformer training. We also improve the secret recovery methods of Salsa and introduce a novel cross-attention recovery mechanism allowing us to read off the secret directly from the trained models. While Picante does not threaten NIST's proposed LWE standards, it demonstrates significant improvement over Salsa and could scale further, highlighting the need for future investigation into machine learning attacks on LWE with sparse binary secrets.

Duke Scholars

Published In

CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security

DOI

Publication Date

November 15, 2023

Start / End Page

2606 / 2620
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Li, C. Y., Malhou, M., Sotáková, J., Garcelon, E., Lauter, K., Wenger, E., & Charton, F. (2023). Salsa Picante: A Machine Learning Attack On LWE with Binary Secrets. In CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (pp. 2606–2620). https://doi.org/10.1145/3576915.3623076
Li, C. Y., M. Malhou, J. Sotáková, E. Garcelon, K. Lauter, E. Wenger, and F. Charton. “Salsa Picante: A Machine Learning Attack On LWE with Binary Secrets.” In CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2606–20, 2023. https://doi.org/10.1145/3576915.3623076.
Li CY, Malhou M, Sotáková J, Garcelon E, Lauter K, Wenger E, et al. Salsa Picante: A Machine Learning Attack On LWE with Binary Secrets. In: CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. 2023. p. 2606–20.
Li, C. Y., et al. “Salsa Picante: A Machine Learning Attack On LWE with Binary Secrets.” CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023, pp. 2606–20. Scopus, doi:10.1145/3576915.3623076.
Li CY, Malhou M, Sotáková J, Garcelon E, Lauter K, Wenger E, Charton F. Salsa Picante: A Machine Learning Attack On LWE with Binary Secrets. CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. 2023. p. 2606–2620.

Published In

CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security

DOI

Publication Date

November 15, 2023

Start / End Page

2606 / 2620