GitHub - malb/bdd-predicate: Solving BDD and uSVP with predicate (original) (raw)

Bounded Distance Decoding with Predicate

This repository contains the Python/Sagemath source code for solving Bounded Distance Decoding augmented with a predicate characterising the target as introduced in:

On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem

Martin R. Albrecht and Nadia Heninger

Lattice-based algorithms in cryptanalysis often search for a target vector satisfying integer linear constraints as a shortest or closest vector in some lattice. In this work, we observe that these formulations may discard non-linear information from the underlying application that can be used to distinguish the target vector even when it is far from being uniquely close or short.

We formalize lattice problems augmented with a predicate distinguishing a target vector and give algorithms for solving instances of these problems. We apply our techniques to lattice-based approaches for solving the Hidden Number Problem, a popular technique for recovering secret DSA or ECDSA keys in side-channel attacks, and demonstrate that our algorithms succeed in recovering the signing key for instances that were previously believed to be unsolvable using lattice approaches. We carried out extensive experiments using our estimation and solving framework, which we also make available with this work.

If you use this library in your work please cite

Martin R. Albrecht and Nadia Heninger. On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem. EUROCRYPT 2021. full version available as Cryptology ePrint Archive: Report 2020/1540

ECDSA with Partially Known Nonces

The flagship application of this work is solving ECDSA with known nonce bits. The ecdsa_cli.py script provides a high level entry point.

  1. To get estimates for the running times of the different algorithms for a set of parameters, the estimate functionality can be invoked as
    sage -python ecdsa_cli.py estimate -n 256 -k 252 -m 66
  2. To run the solver on a randomly generated problem instance with these parameters, use the benchmark function:
    sage -python ecdsa_cli.py benchmark -n 256 -k 252 -m 65 --loglvl DEBUG
    If the algorithm is not specified, the script will automatically choose one for you, but you can also specify your chosen algorithm on the command line
    sage -python ecdsa_cli.py benchmark -n 256 -k 252 -m 65 --algorithm "enum_pred" --loglvl DEBUG
  3. To actually compute the secret key from input provided in a file, you can use the solve function. You need to specify the curve to use by name:
    sage -python ecdsa_cli.py solve -c secp256k1 sample_input.txt
    Each line of the file is a space-separated list of the bit length of the nonce, the hex-encoded hash used in the ECDSA signature, the hex-encoded ECDSA signature as (r,s) concatenated together, and the hex-encoded public key. The ecdsa.sample function will generate sample input in this form.

For the moment, our scripts assume the most significant bits of the nonce are 0. If your use case involves known nonzero most significant bits, least significant bits, or another case, you can either transform your signatures and hash values accordingly, or modify our script to implement that case.

The following example uses the scale strategy to continue searching until the solution is found, which can deal with errors in the data, and will parallelize the algorithm in 8 threads:

sage -python ecdsa_cli.py solve -c secp256k1 -f scale -p 8 sample_input.txt

If you wish to write your own script to use our functions as a library, here is a small custom Python script that shows how to invoke the relevant functions to compute the secret key for some randomly generated data:

from ecdsa_hnp import ECDSA, ECDSASolver,make_klen_list

if name=='main': k = 252 m = 70 ecdsa = ECDSA(nbits=256) lines, k_list, d = ecdsa.sample(m,make_klen_list(k,m)) solver = ECDSASolver(ecdsa,lines,m=m) key, res = solver("bkz-enum") if res.success: print(hex(key)) else: print("Failed")

Implemented Algorithms

Our algorithms solve the unique shortest vector problem augmented with a predicate. Using Kannan's embedding this enables to solve bounded distance decoding augmented with a predicate.

How to Install/Run

This framework builds on

Using Conda/Manually

conda create -n bddp python=3.10 conda activate bddp conda install -c conda-forge sage

# It is generally not necessary to update FPLLL/FPyLLL

git clone https://github.com/fplll/fplll

cd fplll

autoreconf -i

./configure --prefix=$SAGE_LOCAL --disable-static

make install

cd ..

git clone https://github.com/fplll/fpylll

cd fpylll

pip install -r requirements.txt

pip install -r suggestions.txt

python setup.py build

python setup.py -q install

cd ..

git clone https://github.com/fplll/g6k cd g6k autoreconf -i ./configure --prefix=$SAGE_LOCAL --disable-static make pip install -r requirements.txt ./rebuild.sh python setup.py build python setup.py -q install cd ..

Using Docker

Running

docker run -ti --rm -v pwd:/bdd-predicate -w /bdd-predicate martinralbrecht/bdd-predicate

from the root directory of this repository will start SageMath with recent versions of FPLLL, FPyLLL and G6K installed. Our code is available under /bdd-predicate. Thus, e.g.

cd /bdd-predicate load("usvp.py")

will load it.

Acknowledgements

This work was supported by EPSRC grants EP/S020330/1, EP/S02087X/1, by the European Union Horizon 2020 Research and Innovation Program Grant 780701, Innovate UK grant AQuaSec, US NSF under grants no. 1513671, 1651344, and 1913210. Part of this work was done while the authors were visiting the Simons Institute for the Theory of Computing. Our experiments were carried out on Cisco UCS equipment donated by Cisco and housed at UCSD.