1996-09-07 - Lattice Crypto

Header Data

From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: 3a093c13604e04568ce25c34f10aa9160eeda66125a397d20a1e7c26604e8d55
Message ID: <199609071338.NAA06648@pipe3.t1.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-09-07 16:12:59 UTC
Raw Date: Sun, 8 Sep 1996 00:12:59 +0800

Raw message

From: jya@pipeline.com (John Young)
Date: Sun, 8 Sep 1996 00:12:59 +0800
To: cypherpunks@toad.com
Subject: Lattice Crypto
Message-ID: <199609071338.NAA06648@pipe3.t1.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


   The Economist, September 7, 1996, p. 79. 
 
 
   Cryptography: Puzzling secrets 
 
 
   The truly paranoid have but one friend: mathematics. 
   Nothing (and nobody) else can be as trusted to keep a 
   secret. To transmit your credit card number, for example, 
   through an Internet full of thieves, the best way is to 
   hide it in a mathematical problem so excruciatingly 
   difficult that no thief could ever crack it, even by 
   hijacking all the world's computers for the effort. 
   Devising such problems is the business of cryptographers. 
 
   To be useful, the problems must be easy to create as well 
   as impossible to unravel. Multiplying numbers is very 
   easy. Taking the result and working out what numbers were 
   multiplied together to produce it (known as 
   factorisation) is a lot more difficult. It is not obvious 
   that 4,294,967,297 is the product of 641 and 6,700,417. 
 
   The two smaller numbers in this calculation are prime: 
   that is, neither can be factorised into two further 
   smaller numbers. The coding systems generally used by 
   governments, businesses and software companies such as 
   Netscape (known as RSA encoding schemes, after Ronald 
   Rivest, Adi Shamir, and Leonard Adleman, who invented the 
   idea in 1977), mix a number even huger than 4,294,967,297 
   into a message, and then churn it in such a way that only 
   the number's prime factors can undo the mess. The big 
   number is used to make a "public key" (each user has his 
   own, but it is available to those who might wish to 
   communicate with him). The two prime factors compose a 
   private key, guarded carefully by their owner. 
 
   The trouble is that nobody is absolutely sure how safe 
   this scheme is. At present a public key that was 400 
   digits long would take existing computers longer than the 
   age of the universe to crack. But it remains to be proved 
   in a rigorous mathematical way that no systematic 
   short-cut exists. Indeed, some types of numbers are easy 
   to factorise, and RSA schemes must avoid these known 
   softies. It may yet turn out that, even if factorising is 
   hard in general (as mathematicians suspect, after 
   centuries of trying), there is a sneaky way, in the case 
   of some other types of numbers, to do it quickly. 
 
   This would be bad luck if you chose such a number. 
   Private users may not care much: it is unlikely that 
   someone who discovered such a loophole would use it for 
   anything so modest as unscrambling credit card numbers. 
   But governments, whose secrets are worth a lot more, are 
   always on the lookout for better cloaks to go with their 
   daggers. The ultimate cryptographic feat would therefore 
   be a mathematical proof that all choices of a particular 
   problem useful in code-making are forever intractable. 
 
   Nobody is that clever yet. But Miklos Ajtai, a 
   mathematician at the IBM Almaden Research Centre in San 
   Jose, California, has made progress with puzzles called 
   "lattice reductions". If you pick any such problem using 
   his guidelines, it is -- unlike a factorisation problem 
   -- guaranteed to be just as thorny as the most difficult 
   one imaginable. Since many mathematicians also suspect 
   that the toughest lattice-reduction problem is almost 
   impossible to crack, Dr Ajtai's proof, completed in May, 
   increases the confidence that they would all make good 
   wrappings for secret messages. 
 
   For mathematical aesthetes, lattice problems have more 
   panache than the dull numerals of factorisation. Instead 
   of factorising, say, a 200-digit number, a lattice 
   reduction invites the would-be codebreaker to deduce the 
   most basic way a pattern repeats itself in a piece of 
   200-dimensional decorative wallpaper. This is every bit 
   as hard as it sounds. 
 
   To describe a repeating pattern of rows and columns of 
   flowers on an ordinary piece of wallpaper, two "arrows" 
   suffice. Each points from one flower to a nearby one. If 
   you start with a wall which is blank, except for one 
   flower, you can reconstruct the entire design with the 
   arrows: lay the ends of the arrows on the flower and draw 
   new flowers (with new arrows) at each arrowtip. Repeat 
   the process with the new flowers and the wall will 
   eventually be full. 
 
   Although the obvious pair of arrows to choose in this 
   case would be at right angles to each other (eg, pointing 
   north and east) other pairs would also work: for example 
   north-east and east. But in this case the "north-east" 
   arrow would have to be longer to reach the centre of the 
   next flower than the "east" one. The puzzle is to find 
   the shortest set of arrows that can be used to replicate 
   the pattern -- easy in two or three dimensions, but 
   achingly complex in the higher-dimensional spaces that 
   the imaginations of mathematicians inhabit. By the time 
   the pattern has 200 dimensions, today's fastest computers 
   would be unable to find the 200 smallest arrows 
   describing an arbitrary pattern before the sun ran out of 
   fuel. Yet, as with two prime numbers, it is easy to begin 
   with those arrows and produce the design. 
 
   But how do you hide a secret message, accessible only 
   with a private key, in a publicly available lattice? 
   Shafi Goldwasser, Oded Goldreich and Shai Halevi, of the 
   Massachusetts Institute of Technology and the Weizmann 
   Institute, in Israel, have just proposed a way. In order 
   to encode a line of digits, they first interpret them as 
   coordinates for a point in the lattice. Then they mix up 
   the numbers by nudging that point a tiny random amount 
   into the empty space between lattice points. To retrieve 
   the original number, an eavesdropper would need to find 
   the way back to the nearest lattice point, which is 
   almost -- but not quite equivalent to knowing its 
   shortest arrows. 
 
   The trouble with it being not quite equivalent is that 
   the encoding scheme changes the problem slightly -- 
   enough for it to fall just outside the range of Dr 
   Ajtai's proof that any instance of his lattice scheme is 
   as hard to solve as the most difficult one. 
 
   There is hope that the proof can be extended to include 
   the encryption scheme, or that the scheme can be modified 
   to fit the proof. But a proof that nobody could ever 
   invent a quick method to solve the toughest lattice 
   reduction would be nicer still -- except that its 
   inventor would put fellow code-breakers out of work. A 
   cryptographer who invented such a system might well be 
   tempted to keep it secret. 
 
   [Graphic of wallpaper omitted] 
 
   [End] 
 
 
 
 
 
 
 





Thread