Practical Analysis of Key Recovery Attack Against Search-LWE Problem