Hash functions from superspecial genus-2 curves using Richelot isogenies

03/15/2019
by   Wouter Castryck, et al.
0

Last year Takashima proposed a version of Charles, Goren and Lauter's hash function using Richelot isogenies, starting from a genus-2 curve that allows for all subsequent arithmetic to be performed over a quadratic finite field Fp2. In a very recent paper Flynn and Ti point out that Takashima's hash function is insecure due to the existence of small isogeny cycles. We revisit the construction and show that it can be repaired by imposing a simple restriction, which moreover clarifies the security analysis. The runtime of the resulting hash function is dominated by the extraction of 3 square roots for every block of 3 bits of the message, as compared to one square root per bit in the elliptic curve case; however in our setting the extractions can be parallelized and are done in a finite field whose bit size is reduced by a factor 3. Along the way we argue that the full supersingular isogeny graph is the wrong context in which to study higher-dimensional analogues of Charles, Goren and Lauter's hash function, and advocate the use of the superspecial subgraph, which is the natural framework in which to view Takashima's Fp2-friendly starting curve.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/30/2023

Cryptanalysis of a Cayley Hash Function Based on Affine Maps in one Variable over a Finite Field

Cayley hash functions are cryptographic hashes constructed from Cayley g...
research
11/17/2022

MiftyCoin (MFT): A Cryptocurrency Mined with Proof of Human Work

We present in this paper a cryptocurrency called Mobile Fungible Token (...
research
02/21/2020

Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function

Pseudorandom bit generators (PRBG) can be designed to take the advantage...
research
08/14/2021

Probability Distributions for Elliptic Curves in the CGL Hash Function

Hash functions map data of arbitrary length to data of predetermined len...
research
01/13/2021

Crooked Indifferentiability Revisited

In CRYPTO 2018, Russell et al introduced the notion of crooked indiffere...
research
12/05/2022

Inverting Cryptographic Hash Functions via Cube-and-Conquer

MD4 and MD5 are seminal cryptographic hash functions proposed in early 1...
research
02/14/2019

GPU Accelerated Keccak (SHA3) Algorithm

Hash functions like SHA-1 or MD5 are one of the most important cryptogra...

Please sign up or login with your details

Forgot password? Click here to reset