Abstract
We implement a systematic approach for generating, evaluating, and benchmarking Learning with Errors implementations in Sage Math by varying lattice dimensions, moduli, error standard deviations, and multiple error distributions to observe concrete security-efficiency tradeoffs. The security estimator maps parameter sets to concrete security levels and bits, while performance metrics measured computational efficiency and memory requirements. Results indicate that various distribution types do not significantly impact security, though binomial distributions require more computational overhead than discrete gaussian or uniform. Memory requirements increased when modulus q increased from 12289 to 65537. Larger dimensions have an exponentially growing requirement for memory, but this growth is outpaced by the computational hardness and security at larger dimensions. Finally, BKZ attack schemes require significant computational resources and time to run and successfully break LWE encryption schemes, at even modest dimension values.
Faculty Advisor/Mentor
Safdar Bouk
Document Type
Paper
Disciplines
Algebra | Mathematics | Other Applied Mathematics | Other Mathematics
DOI
10.25776/7agx-zj80
Publication Date
4-10-2025
Upload File
wf_yes
Learning With Errors Parameter Analysis
We implement a systematic approach for generating, evaluating, and benchmarking Learning with Errors implementations in Sage Math by varying lattice dimensions, moduli, error standard deviations, and multiple error distributions to observe concrete security-efficiency tradeoffs. The security estimator maps parameter sets to concrete security levels and bits, while performance metrics measured computational efficiency and memory requirements. Results indicate that various distribution types do not significantly impact security, though binomial distributions require more computational overhead than discrete gaussian or uniform. Memory requirements increased when modulus q increased from 12289 to 65537. Larger dimensions have an exponentially growing requirement for memory, but this growth is outpaced by the computational hardness and security at larger dimensions. Finally, BKZ attack schemes require significant computational resources and time to run and successfully break LWE encryption schemes, at even modest dimension values.