Pre- and post-quantum Diffie-Hellman from groups, actions, and isogenies

09/13/2018
by   Benjamin Smith, et al.
0

Diffie-Hellman key exchange is at the foundations of public-key cryptography, but conventional group-based Diffie-Hellman is vulnerable to Shor's quantum algorithm. A range of 'post-quantum Diffie-Hellman' protocols have been proposed to mitigate this threat, including the Couveignes, Rostovtsev-Stolbunov, SIDH, and CSIDH schemes, all based on the combinatorial and number-theoretic structures formed by isogenies of elliptic curves. Pre-and post-quantum Diffie-Hellman schemes resemble each other at the highest level, but the further down we dive, the more differences emerge-differences that are critical when we use Diffie-Hellman as a basic component in more complicated constructions. In this survey we compare and contrast pre-and post-quantum Diffie-Hellman algorithms, highlighting some important subtleties.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/31/2018

The Impact of Quantum Computing on Present Cryptography

The aim of this paper is to elucidate the implications of quantum comput...
research
03/12/2023

Protecting Quantum Procrastinators with Signature Lifting: A Case Study in Cryptocurrencies

Current solutions to quantum vulnerabilities of widely used cryptographi...
research
07/22/2023

Quantum Money from Abelian Group Actions

We give a candidate construction of public key quantum money, and even a...
research
07/23/2021

A survey on NIST PQ signatures

Shor's shockingly fast quantum algorithm for solving the period-finding ...
research
12/02/2019

Mobile Energy Requirements of the Upcoming NIST Post-Quantum Cryptography Standards

Standardization of Post-Quantum Cryptography (PQC) was started by NIST i...
research
09/06/2023

Exploring Post-Quantum Cryptographic Schemes for TLS in 5G Nb-IoT: Feasibility and Recommendations

Narrowband Internet of Things (NB-IoT) is a wireless communication techn...
research
06/16/2021

OpenSSLNTRU: Faster post-quantum TLS key exchange

Google's CECPQ1 experiment in 2016 integrated a post-quantum key-exchang...

Please sign up or login with your details

Forgot password? Click here to reset