I am going through the portion mentioned under the heading Original KYBER analysis inside Section 5.5 titled Attacks exploiting decryption failures.
$${\sf Pr}[\|v\|> k\sigma \sqrt{m}]< k^m e^{\frac{m}{2}(1-k^2)} \hskip5em (1)$$
Equation $1$ is used for computing the probability of finding a $m$-dimensional vector $v$ (picked from a discrete Gaussian distribution with standard deviation $\sigma$) of norm greater than average norm by a factor of $k$.
Later on, they used the following inequality.
If for any vector $v$, if $z$ is chosen according to a Gaussian with standard deviation $\sigma$, then for any $k$,
$$Pr[|\langle z, v\rangle |> k \sigma \|v\|] \leq 2 e^{-\frac{k^2}{2}} \hskip5em (2)$$
As fas as I understood, the authors are trying to maximize the norm of the term $s^Te_1 + e^Tr$. In equation 1 & 2, take $v = (e_1,r)$ and $z = (s,e)$.
First, the author used equation 1 to find the probability of picking a vector $v = (e_1,r)$ of norm greater than the average norm by a factor of 1.33.
Next, author find the value of $k$ in equation 2 such that RHS is equal to the Decryption Failure Probability of Kyber-768.
Lastly, they concluded that they can decrease $k$ in equation 2 by a factor of 1.33, and computed the probability in equation 2, that is finally used for the complexity calculations.
I have the following doubts:
Q1. In step 2, the authors set the RHS of equation 2 to the Decryption Failure Probability of Kyber-768, and later, in step 3, decreased the value of k by a certain factor. I am not able to understand the reasoning behind these steps.
Q2. In equation 1, it is assumed that distribution of $e_1,r$ is close to Discrete Gaussian with SD $\sigma$. So, what happens in the case of Kyber-512 (where SD for $e_1$ and $r$ is different)
Q3. Any suggestions for any automated tools to compute the complexity of decryption failure attack for a general LWE-based KEM.