Abstract

We implement a systematic approach for generating, evaluating, and benchmarking Learning with Errors implementations in Sage Math by varying lattice dimensions, moduli, error standard deviations, and multiple error distributions to observe concrete security-efficiency tradeoffs. The security estimator maps parameter sets to concrete security levels and bits, while performance metrics measured computational efficiency and memory requirements. Results indicate that various distribution types do not significantly impact security, though binomial distributions require more computational overhead than discrete gaussian or uniform. Memory requirements increased when modulus q increased from 12289 to 65537. Larger dimensions have an exponentially growing requirement for memory, but this growth is outpaced by the computational hardness and security at larger dimensions. Finally, BKZ attack schemes require significant computational resources and time to run and successfully break LWE encryption schemes, at even modest dimension values.

Faculty Advisor/Mentor

Safdar Bouk

Document Type

Paper

Disciplines

Algebra | Mathematics | Other Applied Mathematics | Other Mathematics

DOI

10.25776/7agx-zj80

Publication Date

4-10-2025

Upload File

wf_yes

Share

COinS
 

Learning With Errors Parameter Analysis

We implement a systematic approach for generating, evaluating, and benchmarking Learning with Errors implementations in Sage Math by varying lattice dimensions, moduli, error standard deviations, and multiple error distributions to observe concrete security-efficiency tradeoffs. The security estimator maps parameter sets to concrete security levels and bits, while performance metrics measured computational efficiency and memory requirements. Results indicate that various distribution types do not significantly impact security, though binomial distributions require more computational overhead than discrete gaussian or uniform. Memory requirements increased when modulus q increased from 12289 to 65537. Larger dimensions have an exponentially growing requirement for memory, but this growth is outpaced by the computational hardness and security at larger dimensions. Finally, BKZ attack schemes require significant computational resources and time to run and successfully break LWE encryption schemes, at even modest dimension values.