@techreport{bos2016frodo, author = {Bos, Joppe and Costello, Craig and Ducas, Leo and Mironov, Ilya and Naehrig, Michael and Nikolaenko, Valeria and Raghunathan, Ananth and Stebila, Douglas}, title = {Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE}, year = {2016}, month = {September}, abstract = {Lattice-based cryptography offers some of the most attractive primitives believed to be resistant to quantum computers. Following increasing interest from both companies and government agencies in building quantum computers, a number of works have proposed instantiations of practical post-quantum key exchange protocols based on hard problems in ideal lattices, mainly based on the Ring Learning With Errors (R-LWE) problem. While ideal lattices facilitate major efficiency and storage benefits over their non-ideal counterparts, the additional ring structure that enables these advantages also raises concerns about the assumed difficulty of the underlying problems. Thus, a question of significant interest to cryptographers, and especially to those currently placing bets on primitives that will withstand quantum adversaries, is how much of an advantage the additional ring structure actually gives in practice. Despite conventional wisdom that generic lattices might be too slow and unwieldy, we demonstrate that LWE-based key exchange is quite practical: our constant time implementation requires around 1.3ms computation time for each party; compared to the recent NewHope R-LWE scheme, communication sizes increase by a factor of 4.7, but remain under 12 KiB in each direction. Our protocol is competitive when used for serving web pages over TLS; when partnered with ECDSA signatures, latencies increase by less than a factor of 1.6, and (even under heavy load) server throughput only decreases by factors of 1.5 and 1.2 when serving typical 1 KiB and 100 KiB pages, respectively. To achieve these practical results, our protocol takes advantage of several innovations. These include techniques to optimize communication bandwidth, dynamic generation of public parameters (which also offers additional security against backdoors), carefully chosen error distributions, and tight security parameters.}, publisher = {ACM New York, NY, USA}, url = {http://approjects.co.za/?big=en-us/research/publication/frodo-take-off-ring-practical-quantum-secure-key-exchange-lwe/}, pages = {1006-1018}, isbn = {978-1-4503-4139-4}, edition = {23rd ACM Conference on Computer and Communications Security (CCS 2016), Vienna, Austria}, number = {MSR-TR-2016-1137}, note = {23rd ACM Conference on Computer and Communications Security (CCS 2016), Vienna, Austria}, }