Ramanujan graphs in cryptography

06/14/2018
by   Anamaria Costache, et al.
0

In this paper we study the security of a proposal for Post-Quantum Cryptography from both a number theoretic and cryptographic perspective. Charles-Goren-Lauter in 2006 [CGL06] proposed two hash functions based on the hardness of finding paths in Ramanujan graphs. One is based on Lubotzky-Phillips-Sarnak (LPS) graphs and the other one is based on Supersingular Isogeny Graphs. A 2008 paper by Petit-Lauter-Quisquater breaks the hash function based on LPS graphs. On the Supersingular Isogeny Graphs proposal, recent work has continued to build cryptographic applications on the hardness of finding isogenies between supersingular elliptic curves. A 2011 paper by De Feo-Jao-Plût proposed a cryptographic system based on Supersingular Isogeny Diffie-Hellman as well as a set of five hard problems. In this paper we show that the security of the SIDH proposal relies on the hardness of the SIG path-finding problem introduced in [CGL06]. In addition, similarities between the number theoretic ingredients in the LPS and Pizer constructions suggest that the hardness of the path-finding problem in the two graphs may be linked. By viewing both graphs from a number theoretic perspective, we identify the similarities and differences between the Pizer and LPS graphs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/22/2021

A Cryptographic Hash Function from Markoff Triples

Cryptographic hash functions from expander graphs were proposed by Charl...
research
02/21/2020

Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function

Pseudorandom bit generators (PRBG) can be designed to take the advantage...
research
04/30/2022

Failing to hash into supersingular isogeny graphs

An important open problem in supersingular isogeny-based cryptography is...
research
11/02/2021

The supersingular isogeny path and endomorphism ring problems are equivalent

We prove that the path-finding problem in ℓ-isogeny graphs and the endom...
research
08/14/2021

Probability Distributions for Elliptic Curves in the CGL Hash Function

Hash functions map data of arbitrary length to data of predetermined len...
research
01/23/2018

Post-Quantum Cryptography: Riemann Primitives and Chrysalis

The Chrysalis project is a proposed method for post-quantum cryptography...
research
07/06/2021

On Search Complexity of Discrete Logarithm

In this work, we study the discrete logarithm problem in the context of ...

Please sign up or login with your details

Forgot password? Click here to reset