Analysis on Aigis‐Enc: Asymmetrical and symmetrical
Abstract Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE). A thorough comparison between Aigis‐Enc (with the recommended parameters) and a symmetrical LWE encryption scheme on the same scale (the sampling parameters are {η1, η2} = {2, 2} instead of {1, 4}) on Cho...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2021-03-01
|
| Series: | IET Information Security |
| Subjects: | |
| Online Access: | https://doi.org/10.1049/ise2.12009 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849399923823345664 |
|---|---|
| author | Yupu Hu Siyue Dong Xingting Dong |
| author_facet | Yupu Hu Siyue Dong Xingting Dong |
| author_sort | Yupu Hu |
| collection | DOAJ |
| description | Abstract Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE). A thorough comparison between Aigis‐Enc (with the recommended parameters) and a symmetrical LWE encryption scheme on the same scale (the sampling parameters are {η1, η2} = {2, 2} instead of {1, 4}) on Chosen‐plaintext attack (CPA) security, computation complexity and decryption failure probability is made. In particular, the authors ascertain that the CPA security of Aigis‐Enc is 160.895, and that of the symmetrical LWE encryption scheme on the same scale is 161.834. The ratio of computation complexity on the sampling amount of the former and the latter is 5:4 in the key generation phase and 19:14 in the encryption phase. The decryption failure probability of the former is 2−128.699 and that of the latter is 2−67.0582, then the authors show how to reduce the decryption failure probability of the latter significantly by increasing some traffic. Furthermore, those attacks presented by designers of Aigis‐Enc, including primal attacks and dual attacks are generalised. Our attacks are more extensive, simpler, and clearer. With them, the optimal attacks and the ‘optimal‐optimal attacks’ on Aigis‐Enc and the symmetrical LWE scheme on the same scale are obtained. |
| format | Article |
| id | doaj-art-a48fb9f6794543f7a3f665028da5aa7d |
| institution | Kabale University |
| issn | 1751-8709 1751-8717 |
| language | English |
| publishDate | 2021-03-01 |
| publisher | Wiley |
| record_format | Article |
| series | IET Information Security |
| spelling | doaj-art-a48fb9f6794543f7a3f665028da5aa7d2025-08-20T03:38:13ZengWileyIET Information Security1751-87091751-87172021-03-0115214715510.1049/ise2.12009Analysis on Aigis‐Enc: Asymmetrical and symmetricalYupu Hu0Siyue Dong1Xingting Dong2Xidian University Xi'an Shaanxi ChinaXidian University Xi'an Shaanxi ChinaXidian University Xi'an Shaanxi ChinaAbstract Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE). A thorough comparison between Aigis‐Enc (with the recommended parameters) and a symmetrical LWE encryption scheme on the same scale (the sampling parameters are {η1, η2} = {2, 2} instead of {1, 4}) on Chosen‐plaintext attack (CPA) security, computation complexity and decryption failure probability is made. In particular, the authors ascertain that the CPA security of Aigis‐Enc is 160.895, and that of the symmetrical LWE encryption scheme on the same scale is 161.834. The ratio of computation complexity on the sampling amount of the former and the latter is 5:4 in the key generation phase and 19:14 in the encryption phase. The decryption failure probability of the former is 2−128.699 and that of the latter is 2−67.0582, then the authors show how to reduce the decryption failure probability of the latter significantly by increasing some traffic. Furthermore, those attacks presented by designers of Aigis‐Enc, including primal attacks and dual attacks are generalised. Our attacks are more extensive, simpler, and clearer. With them, the optimal attacks and the ‘optimal‐optimal attacks’ on Aigis‐Enc and the symmetrical LWE scheme on the same scale are obtained.https://doi.org/10.1049/ise2.12009probabilitycomputational complexitycryptographycomputer crimelearning (artificial intelligence) |
| spellingShingle | Yupu Hu Siyue Dong Xingting Dong Analysis on Aigis‐Enc: Asymmetrical and symmetrical IET Information Security probability computational complexity cryptography computer crime learning (artificial intelligence) |
| title | Analysis on Aigis‐Enc: Asymmetrical and symmetrical |
| title_full | Analysis on Aigis‐Enc: Asymmetrical and symmetrical |
| title_fullStr | Analysis on Aigis‐Enc: Asymmetrical and symmetrical |
| title_full_unstemmed | Analysis on Aigis‐Enc: Asymmetrical and symmetrical |
| title_short | Analysis on Aigis‐Enc: Asymmetrical and symmetrical |
| title_sort | analysis on aigis enc asymmetrical and symmetrical |
| topic | probability computational complexity cryptography computer crime learning (artificial intelligence) |
| url | https://doi.org/10.1049/ise2.12009 |
| work_keys_str_mv | AT yupuhu analysisonaigisencasymmetricalandsymmetrical AT siyuedong analysisonaigisencasymmetricalandsymmetrical AT xingtingdong analysisonaigisencasymmetricalandsymmetrical |