Analysis on Aigis‐Enc: Asymmetrical and symmetrical

Abstract Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE). A thorough comparison between Aigis‐Enc (with the recommended parameters) and a symmetrical LWE encryption scheme on the same scale (the sampling parameters are {η1, η2} = {2, 2} instead of {1, 4}) on Cho...

Full description

Saved in:
Bibliographic Details
Main Authors: Yupu Hu, Siyue Dong, Xingting Dong
Format: Article
Language:English
Published: Wiley 2021-03-01
Series:IET Information Security
Subjects:
Online Access:https://doi.org/10.1049/ise2.12009
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849399923823345664
author Yupu Hu
Siyue Dong
Xingting Dong
author_facet Yupu Hu
Siyue Dong
Xingting Dong
author_sort Yupu Hu
collection DOAJ
description Abstract Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE). A thorough comparison between Aigis‐Enc (with the recommended parameters) and a symmetrical LWE encryption scheme on the same scale (the sampling parameters are {η1, η2} = {2, 2} instead of {1, 4}) on Chosen‐plaintext attack (CPA) security, computation complexity and decryption failure probability is made. In particular, the authors ascertain that the CPA security of Aigis‐Enc is 160.895, and that of the symmetrical LWE encryption scheme on the same scale is 161.834. The ratio of computation complexity on the sampling amount of the former and the latter is 5:4 in the key generation phase and 19:14 in the encryption phase. The decryption failure probability of the former is 2−128.699 and that of the latter is 2−67.0582, then the authors show how to reduce the decryption failure probability of the latter significantly by increasing some traffic. Furthermore, those attacks presented by designers of Aigis‐Enc, including primal attacks and dual attacks are generalised. Our attacks are more extensive, simpler, and clearer. With them, the optimal attacks and the ‘optimal‐optimal attacks’ on Aigis‐Enc and the symmetrical LWE scheme on the same scale are obtained.
format Article
id doaj-art-a48fb9f6794543f7a3f665028da5aa7d
institution Kabale University
issn 1751-8709
1751-8717
language English
publishDate 2021-03-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-a48fb9f6794543f7a3f665028da5aa7d2025-08-20T03:38:13ZengWileyIET Information Security1751-87091751-87172021-03-0115214715510.1049/ise2.12009Analysis on Aigis‐Enc: Asymmetrical and symmetricalYupu Hu0Siyue Dong1Xingting Dong2Xidian University Xi'an Shaanxi ChinaXidian University Xi'an Shaanxi ChinaXidian University Xi'an Shaanxi ChinaAbstract Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE). A thorough comparison between Aigis‐Enc (with the recommended parameters) and a symmetrical LWE encryption scheme on the same scale (the sampling parameters are {η1, η2} = {2, 2} instead of {1, 4}) on Chosen‐plaintext attack (CPA) security, computation complexity and decryption failure probability is made. In particular, the authors ascertain that the CPA security of Aigis‐Enc is 160.895, and that of the symmetrical LWE encryption scheme on the same scale is 161.834. The ratio of computation complexity on the sampling amount of the former and the latter is 5:4 in the key generation phase and 19:14 in the encryption phase. The decryption failure probability of the former is 2−128.699 and that of the latter is 2−67.0582, then the authors show how to reduce the decryption failure probability of the latter significantly by increasing some traffic. Furthermore, those attacks presented by designers of Aigis‐Enc, including primal attacks and dual attacks are generalised. Our attacks are more extensive, simpler, and clearer. With them, the optimal attacks and the ‘optimal‐optimal attacks’ on Aigis‐Enc and the symmetrical LWE scheme on the same scale are obtained.https://doi.org/10.1049/ise2.12009probabilitycomputational complexitycryptographycomputer crimelearning (artificial intelligence)
spellingShingle Yupu Hu
Siyue Dong
Xingting Dong
Analysis on Aigis‐Enc: Asymmetrical and symmetrical
IET Information Security
probability
computational complexity
cryptography
computer crime
learning (artificial intelligence)
title Analysis on Aigis‐Enc: Asymmetrical and symmetrical
title_full Analysis on Aigis‐Enc: Asymmetrical and symmetrical
title_fullStr Analysis on Aigis‐Enc: Asymmetrical and symmetrical
title_full_unstemmed Analysis on Aigis‐Enc: Asymmetrical and symmetrical
title_short Analysis on Aigis‐Enc: Asymmetrical and symmetrical
title_sort analysis on aigis enc asymmetrical and symmetrical
topic probability
computational complexity
cryptography
computer crime
learning (artificial intelligence)
url https://doi.org/10.1049/ise2.12009
work_keys_str_mv AT yupuhu analysisonaigisencasymmetricalandsymmetrical
AT siyuedong analysisonaigisencasymmetricalandsymmetrical
AT xingtingdong analysisonaigisencasymmetricalandsymmetrical