On the supersingular GPST attack

The main attack against static-key supersingular isogeny Diffie–Hellman (SIDH) is the Galbraith–Petit–Shani–Ti (GPST) attack, which also prevents the application of SIDH to other constructions such as non-interactive key-exchange. In this paper, we identify and study a specific assumption on which t...

Full description

Bibliographic Details
Main Authors: Basso Andrea, Pazuki Fabien
Format: Article
Language:English
Published: De Gruyter 2021-09-01
Series:Journal of Mathematical Cryptology
Subjects:
Online Access:https://doi.org/10.1515/jmc-2021-0020
_version_ 1798037654574465024
author Basso Andrea
Pazuki Fabien
author_facet Basso Andrea
Pazuki Fabien
author_sort Basso Andrea
collection DOAJ
description The main attack against static-key supersingular isogeny Diffie–Hellman (SIDH) is the Galbraith–Petit–Shani–Ti (GPST) attack, which also prevents the application of SIDH to other constructions such as non-interactive key-exchange. In this paper, we identify and study a specific assumption on which the GPST attack relies that does not necessarily hold in all circumstances. We show that in some circumstances the attack fails to recover part of the secret key. We also characterize the conditions necessary for the attack to fail and show that it rarely happens in real cases. We give a link with collisions in the Charles-Goren-Lauter (CGL) hash function.
first_indexed 2024-04-11T21:29:29Z
format Article
id doaj.art-6cd44119188b496ea8c3e6a069561d3e
institution Directory Open Access Journal
issn 1862-2984
language English
last_indexed 2024-04-11T21:29:29Z
publishDate 2021-09-01
publisher De Gruyter
record_format Article
series Journal of Mathematical Cryptology
spelling doaj.art-6cd44119188b496ea8c3e6a069561d3e2022-12-22T04:02:08ZengDe GruyterJournal of Mathematical Cryptology1862-29842021-09-01161141910.1515/jmc-2021-0020On the supersingular GPST attackBasso Andrea0Pazuki Fabien1Centre for Cyber Security and Privacy, School of Computer Science, University of Birmingham, Birmingham, UKDepartment of Mathematical Sciences, University of Copenhagen, Universitetsparken 5, DK-2100 Copenhagen, DenmarkThe main attack against static-key supersingular isogeny Diffie–Hellman (SIDH) is the Galbraith–Petit–Shani–Ti (GPST) attack, which also prevents the application of SIDH to other constructions such as non-interactive key-exchange. In this paper, we identify and study a specific assumption on which the GPST attack relies that does not necessarily hold in all circumstances. We show that in some circumstances the attack fails to recover part of the secret key. We also characterize the conditions necessary for the attack to fail and show that it rarely happens in real cases. We give a link with collisions in the Charles-Goren-Lauter (CGL) hash function.https://doi.org/10.1515/jmc-2021-0020isogeniessupersingular elliptic curvesmodular invariants14h5214k0211t7194a6081p9465p25
spellingShingle Basso Andrea
Pazuki Fabien
On the supersingular GPST attack
Journal of Mathematical Cryptology
isogenies
supersingular elliptic curves
modular invariants
14h52
14k02
11t71
94a60
81p94
65p25
title On the supersingular GPST attack
title_full On the supersingular GPST attack
title_fullStr On the supersingular GPST attack
title_full_unstemmed On the supersingular GPST attack
title_short On the supersingular GPST attack
title_sort on the supersingular gpst attack
topic isogenies
supersingular elliptic curves
modular invariants
14h52
14k02
11t71
94a60
81p94
65p25
url https://doi.org/10.1515/jmc-2021-0020
work_keys_str_mv AT bassoandrea onthesupersingulargpstattack
AT pazukifabien onthesupersingulargpstattack