Lattice-BasedCryptographyApplicationsScope
Lattice-BasedCryptographyApplicationsScope
net/publication/335499364
Lattice Based Cryptography : Its Applications, Areas of Interest & Future Scope
CITATIONS READS
29 5,313
3 authors, including:
All content following this page was uploaded by Pawan Kumar Pradhan on 03 September 2019.
cryptosystem (GGH) came into existence which mainly combination ∑xi bi where xi ε Z , and the bi ’s are
offered a realistic alternative to number theory[15]. linearly independent vectors over R, where
And as a need to enhance current practices in (b1 , b2 , b3 , ......bn ) are basis vectors[7].
cyber-security, adding such variety in cryptography will L={ Σxi bi | xi ∈ Z x1 }
aid our security at the very fundamental level.
According to the concepts of lattices, lattice sharing same
With substantial changes and improvements in bases are hence equivalent. So no two lattices can share
technology, the diversity in technology tends to increase a the same basis.
lot thus requiring several diverse platforms to run such
tech. And so would Lattice-based cryptographic
Algorithms, in order to tackle Quantum Computation e.g.
Cloud vs IoT platforms. There are several other fields
where they provide enhanced and efficient security for
both long-term and short-term devices and systems e.g.
On the medical grounds like smart medical implants
which have to stay put for years and security is a major
concern here. On Military grounds like missiles with
smart embedded systems where it has to hit a particular
target and the info of target is stored on the system only,
so security plays a critical role here.
● Shortest-Vector Problem (SVP): F or a given under several severe conditions. As till now we Clearly
basis X of lattice L , another basis X ′ is created, know about the Lattices and its Theory. We are well
such that the LX = LX ′ , where vectors of X ′ are aware of the fact that this cryptosystem totally relies on
shortest for any norm[8]. the hardness of the problem.
● Approximate Closest Vector Problem (𝞪-CVP). Some Commonly used Cryptosystems are:-
● Elliptic Curve Cryptography which uses smaller In IoT, the classical cryptographic measures seem to fail
groups, whose operation are more expensive[8]. because the IoT space demands an increased number of
● Lattice-Based Cryptography which uses larger keys. In order to tackle this increased generation of the
groups, whose operation are much cheaper[8]. key by classical cryptographic measures demanded some
development of some standard lightweight cryptographic
Lattice-Based Cryptography uses high-dimensional schemas and cyphers with increased agility and
geometric structures to hide information, creating performance. This development calls out for Lattice-based
problems that are considered impossible to solve without public key cryptosystem and hence becomes an area of
the key even by universal fault-tolerant quantum Interest for its implementation/Application.
computers.
Similar, for cloud computing the channel or the
In order to make such cryptography possible, first of all, software-defined network which it demands, need to have
we need to build a prototype of the system and test it high agility and performance, should be energy-efficient
and must be of low latency. This couldn’t have been cryptography have been made such as Secure Socket
achieved by primitive cryptosystems, which furthermore Layer(SSL) developed by Netscape, Kerberos an
demands an accelerated system, capable enough to run authentication service developed by MIT.
more than one cryptic algorithm with full agility and
efficiency like that of an Application-Specific Integrated Anonymous Remailers: Remailing, is a service that
Circuits(ASCI’s)[5]. receives messages with embedded instructions of where
to send them next while stripping off the header
After those diverse applications of Lattice-based information like the originating address from the
cryptosystems. There are some Applications, which are electronic message and forwarding only the message. So,
used on an everyday basis and is shared by in this process, only the first remailer retains your identity
classical-public key cryptography also. Though both and instead of trusting the operator, uses many
cryptosystems have applications on the same field, lattice anonymous remailers to relay the message before sending
cryptosystem is applied on areas where security is the it to the recipient. Using this method only the first
utmost priority. remailer know the identity of the sender and it becomes
impossible for anyone to retrace back to the sender from
A. AREAS OF INTEREST the end-point. The user wanting anonymity for their
messages uses such kind of service whose encryption is
End-to-End Encryption: The one field of communication based on lattices.
that is widely used, but is the least encrypted is the
E-mail. Since the content of our emails is not sensitive
enough we least care for encryption. But, for people out
there who care for their sensitive information, like
information related to military or political purpose where
the whole country has to suffer if the information gets
leaked out, they can’t have an uncertainty of even 0.01%.
Stamping, Pseudonymous Remailers etc. and several Hence we presume, this technology of lattice-based
other areas which are yet to be discovered. cryptography will make these threats hypothetical.
There is a varied scope of this tech in future. Observing
the emergence of Quantum Computation.
CONCLUSION
ever support us and make us credible enough to reach spectrum, 34(6), 52-59.
successful heights. [12] Micciancio, D. (2001). Improving lattice based cryptosystems using
REFERENCES
[5] Nejatollahi, H., Dutt, N., & Cammarota, R. (2017, October). Special
session: trends, challenges and needs for lattice-based cryptography
implementations. In 2017 International Conference on
Hardware/Software Codesign and System Synthesis (CODES+ ISSS)
(pp. 1-3). IEEE.
[7] Nguyen, P. Q., & Stern, J. (2001, March). The two faces of lattices in
cryptology. In International Cryptography and Lattices Conference (pp.
146-180). Springer, Berlin, Heidelberg.
implementation.
[10] Nyang, D., & Song, J. (1998). Method for hiding information in
[11] Schaller, R. R. (1997). Moore's law: past, present and future. IEEE