On the Security of Supersingular Isogeny Cryptosystems

<p>We study cryptosystems based on supersingular isogenies. This is an active area of research in post-quantum cryptography. Our first contribution is to give a very powerful active attack on the supersingular isogeny encryption scheme. This attack can only be prevented by using a (relatively...

Full description

Bibliographic Details
Main Authors: Galbraith, S, Petit, C, Shani, B, Ti, Y
Format: Conference item
Published: Springer Verlag 2016
_version_ 1826282461670146048
author Galbraith, S
Petit, C
Shani, B
Ti, Y
author_facet Galbraith, S
Petit, C
Shani, B
Ti, Y
author_sort Galbraith, S
collection OXFORD
description <p>We study cryptosystems based on supersingular isogenies. This is an active area of research in post-quantum cryptography. Our first contribution is to give a very powerful active attack on the supersingular isogeny encryption scheme. This attack can only be prevented by using a (relatively expensive) countermeasure. Our second contribution is to show that the security of all schemes of this type depends on the difficulty of computing the endomorphism ring of a supersingular elliptic curve. This result gives significant insight into the difficulty of the isogeny problem that underlies the security of these schemes. Our third contribution is to give a reduction that uses partial knowledge of shared keys to determine an entire shared key. This can be used to retrieve the secret key, given information leaked from a side-channel attack on the key exchange protocol. A corollary of this work is the first bit security result for the supersingular isogeny key exchange: Computing any component of the j-invariant is as hard as computing the whole j-invariant.</p> <p>Our paper therefore provides an improved understanding of the security of these cryptosystems. We stress that our work does not imply that these systems are insecure, or that they should not be used. However, it highlights that implementations of these schemes will need to take account of the risks associated with various active and side-channel attacks.</p>
first_indexed 2024-03-07T00:44:13Z
format Conference item
id oxford-uuid:840faec4-382f-44ec-aeac-76bd5962f7cb
institution University of Oxford
last_indexed 2024-03-07T00:44:13Z
publishDate 2016
publisher Springer Verlag
record_format dspace
spelling oxford-uuid:840faec4-382f-44ec-aeac-76bd5962f7cb2022-03-26T21:48:38ZOn the Security of Supersingular Isogeny CryptosystemsConference itemhttp://purl.org/coar/resource_type/c_5794uuid:840faec4-382f-44ec-aeac-76bd5962f7cbSymplectic Elements at OxfordSpringer Verlag2016Galbraith, SPetit, CShani, BTi, Y<p>We study cryptosystems based on supersingular isogenies. This is an active area of research in post-quantum cryptography. Our first contribution is to give a very powerful active attack on the supersingular isogeny encryption scheme. This attack can only be prevented by using a (relatively expensive) countermeasure. Our second contribution is to show that the security of all schemes of this type depends on the difficulty of computing the endomorphism ring of a supersingular elliptic curve. This result gives significant insight into the difficulty of the isogeny problem that underlies the security of these schemes. Our third contribution is to give a reduction that uses partial knowledge of shared keys to determine an entire shared key. This can be used to retrieve the secret key, given information leaked from a side-channel attack on the key exchange protocol. A corollary of this work is the first bit security result for the supersingular isogeny key exchange: Computing any component of the j-invariant is as hard as computing the whole j-invariant.</p> <p>Our paper therefore provides an improved understanding of the security of these cryptosystems. We stress that our work does not imply that these systems are insecure, or that they should not be used. However, it highlights that implementations of these schemes will need to take account of the risks associated with various active and side-channel attacks.</p>
spellingShingle Galbraith, S
Petit, C
Shani, B
Ti, Y
On the Security of Supersingular Isogeny Cryptosystems
title On the Security of Supersingular Isogeny Cryptosystems
title_full On the Security of Supersingular Isogeny Cryptosystems
title_fullStr On the Security of Supersingular Isogeny Cryptosystems
title_full_unstemmed On the Security of Supersingular Isogeny Cryptosystems
title_short On the Security of Supersingular Isogeny Cryptosystems
title_sort on the security of supersingular isogeny cryptosystems
work_keys_str_mv AT galbraiths onthesecurityofsupersingularisogenycryptosystems
AT petitc onthesecurityofsupersingularisogenycryptosystems
AT shanib onthesecurityofsupersingularisogenycryptosystems
AT tiy onthesecurityofsupersingularisogenycryptosystems