Review of Chosen Isogeny-Based Cryptographic Schemes

Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks. However, Shor’s algorithm suited for quantum computers can break the bedrock of most currently used systems, i.e., the...

Full description

Bibliographic Details
Main Authors: Bartosz Drzazga, Łukasz Krzywiecki
Format: Article
Language:English
Published: MDPI AG 2022-05-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/6/2/27
_version_ 1827661132499779584
author Bartosz Drzazga
Łukasz Krzywiecki
author_facet Bartosz Drzazga
Łukasz Krzywiecki
author_sort Bartosz Drzazga
collection DOAJ
description Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks. However, Shor’s algorithm suited for quantum computers can break the bedrock of most currently used systems, i.e., the RSA problem and discrete logarithm problem. Post-quantum cryptography can withstand attacks carried out by quantum computers. Several families of post-quantum systems exist; one of them is isogeny-based cryptography. As a main contribution, in this paper, we provide a survey of chosen, fundamental isogeny-based schemes. The target audience of this review is researchers interested in practical aspects of this field of cryptography; therefore the survey contains exemplary implementations. Our goal was not to develop an efficient implementation, but to provide materials that make it easier to analyze isogeny-based cryptography.
first_indexed 2024-03-10T00:04:13Z
format Article
id doaj.art-593a9b5485cf489992fe32f2e1ee7b94
institution Directory Open Access Journal
issn 2410-387X
language English
last_indexed 2024-03-10T00:04:13Z
publishDate 2022-05-01
publisher MDPI AG
record_format Article
series Cryptography
spelling doaj.art-593a9b5485cf489992fe32f2e1ee7b942023-11-23T16:11:10ZengMDPI AGCryptography2410-387X2022-05-01622710.3390/cryptography6020027Review of Chosen Isogeny-Based Cryptographic SchemesBartosz Drzazga0Łukasz Krzywiecki1Faculty of Information and Communication Technology, Wrocław University of Science and Technology, 27 Wybrzeze Wyspianskiego St., 50-370 Wroclaw, PolandFaculty of Information and Communication Technology, Wrocław University of Science and Technology, 27 Wybrzeze Wyspianskiego St., 50-370 Wroclaw, PolandPublic-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks. However, Shor’s algorithm suited for quantum computers can break the bedrock of most currently used systems, i.e., the RSA problem and discrete logarithm problem. Post-quantum cryptography can withstand attacks carried out by quantum computers. Several families of post-quantum systems exist; one of them is isogeny-based cryptography. As a main contribution, in this paper, we provide a survey of chosen, fundamental isogeny-based schemes. The target audience of this review is researchers interested in practical aspects of this field of cryptography; therefore the survey contains exemplary implementations. Our goal was not to develop an efficient implementation, but to provide materials that make it easier to analyze isogeny-based cryptography.https://www.mdpi.com/2410-387X/6/2/27cryptographypost-quantumisogeniessupersingular isogeny diffie–HellmanSIDH
spellingShingle Bartosz Drzazga
Łukasz Krzywiecki
Review of Chosen Isogeny-Based Cryptographic Schemes
Cryptography
cryptography
post-quantum
isogenies
supersingular isogeny diffie–Hellman
SIDH
title Review of Chosen Isogeny-Based Cryptographic Schemes
title_full Review of Chosen Isogeny-Based Cryptographic Schemes
title_fullStr Review of Chosen Isogeny-Based Cryptographic Schemes
title_full_unstemmed Review of Chosen Isogeny-Based Cryptographic Schemes
title_short Review of Chosen Isogeny-Based Cryptographic Schemes
title_sort review of chosen isogeny based cryptographic schemes
topic cryptography
post-quantum
isogenies
supersingular isogeny diffie–Hellman
SIDH
url https://www.mdpi.com/2410-387X/6/2/27
work_keys_str_mv AT bartoszdrzazga reviewofchosenisogenybasedcryptographicschemes
AT łukaszkrzywiecki reviewofchosenisogenybasedcryptographicschemes