Weak instances of SIDH variants under improved torsion-point attacks

05/29/2020
by   Péter Kutas, et al.
0

SIDH is a post-quantum key exchange algorithm based on the presumed difficulty of computing isogenies between supersingular elliptic curves. However, the exact hardness assumption SIDH relies on is not the pure isogeny problem; attackers are also provided with the action of the secret isogeny restricted to a subgroup of the curve. Petit (2017) leverages this information to break variants of SIDH in polynomial time, thus demonstrating that exploiting torsion-point information can lead to an attack in some cases. The contribution of this paper is twofold: First, we revisit and improve the techniques of Petit to span a broader range of parameters. Second, we construct SIDH variants designed to be weak against the resulting attacks; this includes weak choices of starting curve under moderately imbalanced parameters as well as weak choices of base field under balanced parameters. We stress that our results do not reveal any weakness in the NIST submission SIKE. However, they do get closer than previous attacks in several ways and may have an impact on the security of SIDH-based group key exchange (Azarderakhsh et al., 2019) and certain instantiations of B-SIDH (Costello, 2019).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/20/2018

Towards practical key exchange from ordinary isogeny graphs

We revisit the ordinary isogeny-graph based cryptosystems of Couveignes ...
research
12/04/2022

Pairing-Friendly Elliptic Curves: Revisited Taxonomy, Attacks and Security Concern

Major families of pairing-friendly elliptic curves, including BN, BLS12,...
research
07/13/2021

An Improvement of a Key Exchange Protocol Relying on Polynomial Maps

Akiyama et al. (Int. J. Math. Indust., 2019) proposed a post-quantum key...
research
06/20/2023

SALSA VERDE: a machine learning attack on Learning With Errors with sparse small secrets

Learning with Errors (LWE) is a hard math problem used in post-quantum c...
research
09/21/2023

The supersingular endomorphism ring problem given one endomorphism

Given a supersingular elliptic curve E and a non-scalar endomorphism α o...
research
06/16/2021

OpenSSLNTRU: Faster post-quantum TLS key exchange

Google's CECPQ1 experiment in 2016 integrated a post-quantum key-exchang...
research
06/14/2021

Multivariate Public Key Cryptosystem from Sidon Spaces

A Sidon space is a subspace of an extension field over a base field in w...

Please sign up or login with your details

Forgot password? Click here to reset