Review of Chosen Isogeny-Based Cryptographic Schemes
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks. However, Shor’s algorithm suited for quantum computers can break the bedrock of most currently used systems, i.e., the...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-05-01
|
Series: | Cryptography |
Subjects: | |
Online Access: | https://www.mdpi.com/2410-387X/6/2/27 |
_version_ | 1827661132499779584 |
---|---|
author | Bartosz Drzazga Łukasz Krzywiecki |
author_facet | Bartosz Drzazga Łukasz Krzywiecki |
author_sort | Bartosz Drzazga |
collection | DOAJ |
description | Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks. However, Shor’s algorithm suited for quantum computers can break the bedrock of most currently used systems, i.e., the RSA problem and discrete logarithm problem. Post-quantum cryptography can withstand attacks carried out by quantum computers. Several families of post-quantum systems exist; one of them is isogeny-based cryptography. As a main contribution, in this paper, we provide a survey of chosen, fundamental isogeny-based schemes. The target audience of this review is researchers interested in practical aspects of this field of cryptography; therefore the survey contains exemplary implementations. Our goal was not to develop an efficient implementation, but to provide materials that make it easier to analyze isogeny-based cryptography. |
first_indexed | 2024-03-10T00:04:13Z |
format | Article |
id | doaj.art-593a9b5485cf489992fe32f2e1ee7b94 |
institution | Directory Open Access Journal |
issn | 2410-387X |
language | English |
last_indexed | 2024-03-10T00:04:13Z |
publishDate | 2022-05-01 |
publisher | MDPI AG |
record_format | Article |
series | Cryptography |
spelling | doaj.art-593a9b5485cf489992fe32f2e1ee7b942023-11-23T16:11:10ZengMDPI AGCryptography2410-387X2022-05-01622710.3390/cryptography6020027Review of Chosen Isogeny-Based Cryptographic SchemesBartosz Drzazga0Łukasz Krzywiecki1Faculty of Information and Communication Technology, Wrocław University of Science and Technology, 27 Wybrzeze Wyspianskiego St., 50-370 Wroclaw, PolandFaculty of Information and Communication Technology, Wrocław University of Science and Technology, 27 Wybrzeze Wyspianskiego St., 50-370 Wroclaw, PolandPublic-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks. However, Shor’s algorithm suited for quantum computers can break the bedrock of most currently used systems, i.e., the RSA problem and discrete logarithm problem. Post-quantum cryptography can withstand attacks carried out by quantum computers. Several families of post-quantum systems exist; one of them is isogeny-based cryptography. As a main contribution, in this paper, we provide a survey of chosen, fundamental isogeny-based schemes. The target audience of this review is researchers interested in practical aspects of this field of cryptography; therefore the survey contains exemplary implementations. Our goal was not to develop an efficient implementation, but to provide materials that make it easier to analyze isogeny-based cryptography.https://www.mdpi.com/2410-387X/6/2/27cryptographypost-quantumisogeniessupersingular isogeny diffie–HellmanSIDH |
spellingShingle | Bartosz Drzazga Łukasz Krzywiecki Review of Chosen Isogeny-Based Cryptographic Schemes Cryptography cryptography post-quantum isogenies supersingular isogeny diffie–Hellman SIDH |
title | Review of Chosen Isogeny-Based Cryptographic Schemes |
title_full | Review of Chosen Isogeny-Based Cryptographic Schemes |
title_fullStr | Review of Chosen Isogeny-Based Cryptographic Schemes |
title_full_unstemmed | Review of Chosen Isogeny-Based Cryptographic Schemes |
title_short | Review of Chosen Isogeny-Based Cryptographic Schemes |
title_sort | review of chosen isogeny based cryptographic schemes |
topic | cryptography post-quantum isogenies supersingular isogeny diffie–Hellman SIDH |
url | https://www.mdpi.com/2410-387X/6/2/27 |
work_keys_str_mv | AT bartoszdrzazga reviewofchosenisogenybasedcryptographicschemes AT łukaszkrzywiecki reviewofchosenisogenybasedcryptographicschemes |