Kuperberg’s Collimation Sieve vs. CSIDH Chris Peikert University of Michigan
Quantum Cryptanalysis of Post-Quantum Cryptography Simons Institute 24 February 2020
1 / 16
Kuperbergs Collimation Sieve vs. CSIDH Chris Peikert University of - - PowerPoint PPT Presentation
Kuperbergs Collimation Sieve vs. CSIDH Chris Peikert University of Michigan Quantum Cryptanalysis of Post-Quantum Cryptography Simons Institute 24 February 2020 1 / 16 He Gives C-Sieves on the CSIDH Chris Peikert University of Michigan
1 / 16
1 / 16
2 / 16
2 / 16
2 / 16
2 / 16
2 / 16
2 / 16
2 / 16
2 / 16
2 / 16
2 / 16
3 / 16
3 / 16
3 / 16
3 / 16
3 / 16
4 / 16
4 / 16
4 / 16
4 / 16
4 / 16
4 / 16
4 / 16
4 / 16
4 / 16
5 / 16
5 / 16
5 / 16
5 / 16
5 / 16
6 / 16
⋆ Handle arbitrary group orders (generalizing from two-power/smooth) ⋆ Recover several secret bits from each sieve run ⋆ Control (classical) memory and time complexities better ⋆ Run simulations up to the exact CSIDH-512 order |G| ≈ 2257.1 6 / 16
⋆ Handle arbitrary group orders (generalizing from two-power/smooth) ⋆ Recover several secret bits from each sieve run ⋆ Control (classical) memory and time complexities better ⋆ Run simulations up to the exact CSIDH-512 order |G| ≈ 2257.1
6 / 16
⋆ Handle arbitrary group orders (generalizing from two-power/smooth) ⋆ Recover several secret bits from each sieve run ⋆ Control (classical) memory and time complexities better ⋆ Run simulations up to the exact CSIDH-512 order |G| ≈ 2257.1
∗Independently, Bonnetain and Schrottenloher gave a complementary, theoretical c-sieve
6 / 16
7 / 16
7 / 16
7 / 16
7 / 16
7 / 16
8 / 16
8 / 16
8 / 16
8 / 16
8 / 16
8 / 16
9 / 16
9 / 16
9 / 16
9 / 16
10 / 16
10 / 16
10 / 16
10 / 16
11 / 16
11 / 16
11 / 16
11 / 16
12 / 16
12 / 16
12 / 16
12 / 16
12 / 16
12 / 16
12 / 16
13 / 16
13 / 16
13 / 16
13 / 16
13 / 16
13 / 16
14 / 16
14 / 16
14 / 16
14 / 16
14 / 16
15 / 16
15 / 16
15 / 16
15 / 16
15 / 16
15 / 16
15 / 16
15 / 16
16 / 16