encryption system, which generally require high dimensional lattices. In particular, we utilize
the BKZ-2.0 simulator of Chen and Nguyen to identify the best lattice attack that can be
mounted using BKZ in a given dimension at a given security level. Using this technique, we
show that it should be possible to work with lattices of smaller dimensions than previous
methods have recommended, while still maintaining reasonable levels of security. As …