Abstract
In this paper we construct a pseudorandom number generator using only worst-case hardness assumptions for standard lattice problems. With a common technique, we can then build a stream cipher by combining the generated pseudorandom sequence with the plaintext. Moreover, as an option to gain efficiency both in terms of speed and memory, we suggest the use of ideal lattices in the construction. Currently, there is no known attack that could exploit this choice. Our implementation for Graphics Processing Units leverages from the parallelism inherent in lattice schemes and reaches performances comparable to the fastest known constructions that enjoy security proofs.

Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ajtai, M.: Generating hard instances of lattice problems. Electron. Colloq. Comput. Complex. (ECCC) 3(7), 99–108 (1996)
Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Halevi, S. (ed.) CRYPTO, volume 5677 of Lecture Notes in Computer Science, pp. 595–618. Springer (2009)
Bellare, M., Boldyreva, A., Kurosawa, K., Staddon, J.: Multirecipient encryption schemes: How to save on bandwidth and computation without sacrificing security. IEEE Trans. Inf. Theory 53(11), 3927–3943 (2007)
Berbain, C., Gilbert, H., Patarin, J.: Quad: a multivariate stream cipher with provable security. J. Symb. Comput. 44(12), 1703–1723 (2009)
Bernstein, D.J., Buchmann, J., Dahmen, E.: Post Quantum Cryptography. Springer Publishing Company, Incorporated, Berlin (2008)
Biham, E., Shamir, A.: Differential cryptanalysis of des-like cryptosystems. In: Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’90, pp. 2–21. Springer (1991)
Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round des. In: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’92, pp. 487–496. Springer (1993)
Biswas, B., Sendrier, N.: Mceliece cryptosystem implementation: theory and practice. In: Buchmann, J., Ding, J. (eds.) PQCrypto, volume 5299 of Lecture Notes in Computer Science, pp. 47–62. Springer (2008)
Brickell, E.F.: Solving low density knapsacks. In: Chaum, D. (ed.) Advances in Cryptology. Proceedings of CRYPTO ’83, Santa Barbara, California, USA, August 21–24, 1983, pp. 25–37. Plenum Press, New York (1983)
Buchmann, J., Lindner, R.: Secure parameters for swifft. In: Roy, B.K., Sendrier, N. (eds.) INDOCRYPT, volume 5922 of Lecture Notes in Computer Science, pp. 1–17. Springer (2009)
Cayrel, P., Meziani, M., Ndiaye, O., Santos, Q.: Efficient software implementations of code-based hash functions and stream-ciphers. In: Koç, Ç.K., Mesnager, S, Savas, E. (eds.) Arithmetic of Finite Fields, volume 9061 of Lecture Notes in Computer Science, pp. 187–203. Springer International Publishing (2015)
Coster, M.J., Joux, A., LaMacchia, B.A., Odlyzko, A.M., Schnorr, C.-P., Stern, J.: Improved low-density subset sum algorithms. Comput. Complex. 2, 111–128 (1992)
de Beer, R., van Ormondt, D., Di Cesare, F., Graveron-Demilly, D., Karras, DA, Starcuk, Z.: Accelerating batched 1D-FFT with a CUDA-capable computer. In: 2010 IEEE International Conference on Imaging Systems and Techniques (IST), pp. 446–451. IEEE (2010)
Feistel, H.: Cryptography and computer privacy. Sci. Am. (1973)
Gaborit, P., Lauradoux, C., Sendrier, N.: Synd: a fast code-based stream cipher with a security reduction. In: IEEE International Symposium on Information Theory, 2007. ISIT 2007, pp. 186 –190, 24–29 (2007)
Gama, N., Nguyen, P.Q.: Predicting lattice reduction. In: Smart, N.P. (ed.) EUROCRYPT, volume 4965 of Lecture Notes in Computer Science, pp. 31–51. Springer (2008)
Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: STOC 89 Proceedings of the twenty-first annual ACM, symposium on Theory of computing, pp. 25–32. ACM, New York, USA (1989)
Golic, J.D.: Cryptanalysis of alleged a5 stream cipher. In: Proceedings of the 16th Annual International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT’97, pp. 239–255. Springer (1997)
Hong, J., Sarkar, P.: Rediscovery of time memory tradeoffs. Cryptology ePrint Archive, Report 2005/090, (2005). http://eprint.iacr.org/
Impagliazzo, R., Naor, M.: Efficient cryptographic schemes provably as secure as subset sum. J. Cryptol. 9(4), 199–216 (1996)
Lyubashevsky, V., Micciancio, D.: Generalized compact knapsacks are collision resistant. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP (2), volume 4052 of Lecture Notes in Computer Science, pp. 144–155. Springer (2006)
Lyubashevsky, V., Micciancio, D., Peikert, C., Rosen, A.: Swifft: a modest proposal for fft hashing. In: Nyberg, K. (ed.) FSE, volume 5086 of Lecture Notes in Computer Science, pp. 54–72. Springer (2008)
Mei, C., Jiang, H., Jenness, J.: CUDA-based AES parallelization with fine-tuned GPU memory utilization. In: 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW), pp. 1–7. IEEE (2010)
Meziani, M., Hoffmann, G., Cayrel, P.-L.: Improving the performance of the SYND stream cipher. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, pp. 99–116. Springer (2012)
Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient one-way functions. Comput. Complex. 16(4):365–411 (2007)
Micciancio, D., Regev, O.: Worst-case to average-case reductions based on gaussian measures. SIAM J. Comput. 37(1), 267–302 (2007)
Muller, F.: Differential attacks and stream ciphers. In: The State of the Art of Stream Ciphers, Workshop Record, ECRYPT Network of Excellence in Cryptology, pp. 133–146 (2004)
Naor, M., Reingold, O.: Synthesizers and their application to the parallel construction of pseudo-random functions. J. Comput. Syst. Sci. 58(2), 336–375 (1999)
Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. In: Mitzenmacher, M. (ed.) STOC 09 Proceedings of the forty-first annual ACM symposium on Theory of computing, pp. 333–342. ACM, New York, USA (2009)
Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: Ladner, R.E., Dwork, C. (eds.) STOC 08 Proceedings of the fortieth annual, ACM symposium on Theory of computing, pp. 187–196. ACM, New York, USA (2008)
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6), 84–93 (2009)
Wagner, D.: A generalized birthday problem. In: Yung, M.(ed.) CRYPTO, volume 2442 of Lecture Notes in Computer Science, pp. 288–303. Springer (2002)
Author information
Authors and Affiliations
Corresponding author
Additional information
Pierre-Louis Cayrel: supported in part by NATO’s Public Diplomacy Division in the framework of “Science for Peace”, SPS Project 984520.
Mohammed Meziani and Ousmane Ndiaye: supported by the The Centre of Excellence in Mathematics, Computer Science and ICT (CEA-MITIC).
Rights and permissions
About this article
Cite this article
Cayrel, PL., Meziani, M., Ndiaye, O. et al. A pseudorandom number generator based on worst-case lattice problems. AAECC 28, 283–294 (2017). https://doi.org/10.1007/s00200-017-0323-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00200-017-0323-1