quantum resistant cryptography based on isogenies between
play

Quantum-resistant Cryptography based on Isogenies between Elliptic - PowerPoint PPT Presentation

Quantum-resistant Cryptography based on Isogenies between Elliptic Curves A Brief Survey Jo ao Paulo da Silva , Ricardo Dahab, Julio L opez Institute of Computing University of Campinas Latin American Week on Coding and Information


  1. Quantum-resistant Cryptography based on Isogenies between Elliptic Curves A Brief Survey Jo˜ ao Paulo da Silva , Ricardo Dahab, Julio L´ opez Institute of Computing – University of Campinas Latin American Week on Coding and Information 2018 1

  2. Agenda Introduction Isogenies Cryptographic Constructions Underlying Problems and Cryptanalysis Remarks Bibliography Latin American Week on Coding and Information 2018 2

  3. Introduction

  4. Motivation In Agust 2015, NSA announces plans to transition to quantum-resistant algorithms NIST published call for post-quantum candidate algorithms with deadline on November 30, 2017 Latin American Week on Coding and Information 2018 4

  5. Motivation Why Isogenies? • Possibility of the emergence of a large-scale quantum computer: Shor’s algorithm; • It emerges as a new candidate in the construction of cryptographic primitives for the post-quantum world; • Using supersingular elliptic curves, the problem of computing isogenies between two curves remains exponential in the quantum model. Latin American Week on Coding and Information 2018 5

  6. Retrospective 1996 Couveignes mentioned about isogenies in cryptography but only published in 2006; 2009 Charles et al presented hash functions constructions based on isogenies; 2010 Stolbunov presented first published isogeny-based public-key cryptosystem based on isogenies between ordinary curves; 2010 Childs et al. presented a quantum subexponenal attack on Stolbunovs public-key cryptosystem; 2011 Jao and De Feo presented the Supersingular Isogeny Diffie-Hellman (SIDH) and a identification protocol; 2017 Jao et al. proposed Supersingular Isogeny Key Encapsulaon (SIKE) as a submission to NIST PQC call; 2018 Castryck et al. proposed a (Comutative)SIDH based on Couveignes construction. Latin American Week on Coding and Information 2018 6

  7. Retrospective 1996 Couveignes mentioned about isogenies in cryptography but only published in 2006; 2009 Charles et al presented hash functions constructions based on isogenies; 2010 Stolbunov presented first published isogeny-based public-key cryptosystem based on isogenies between ordinary curves; 2010 Childs et al. presented a quantum subexponenal attack on Stolbunovs public-key cryptosystem; 2011 Jao and De Feo presented the Supersingular Isogeny Diffie-Hellman (SIDH) and a identification protocol; 2017 Jao et al. proposed Supersingular Isogeny Key Encapsulaon (SIKE) as a submission to NIST PQC call; 2018 Castryck et al. proposed a (Comutative)SIDH based on Couveignes construction. Latin American Week on Coding and Information 2018 7

  8. Retrospective 1996 Couveignes mentioned about isogenies in cryptography but only published in 2006; 2009 Charles et al presented hash functions constructions based on isogenies; 2010 Stolbunov presented first published isogeny-based public-key cryptosystem based on isogenies between ordinary curves; 2010 Childs et al. presented a quantum subexponenal attack on Stolbunovs public-key cryptosystem; 2011 Jao and De Feo presented the Supersingular Isogeny Diffie-Hellman (SIDH) and a identification protocol; 2017 Jao et al. proposed Supersingular Isogeny Key Encapsulaon (SIKE) as a submission to NIST PQC call; 2018 Castryck et al. proposed a (Comutative)SIDH based on Couveignes construction. Latin American Week on Coding and Information 2018 8

  9. Retrospective 1996 Couveignes mentioned about isogenies in cryptography but only published in 2006; 2009 Charles et al presented hash functions constructions based on isogenies; 2010 Stolbunov presented first published isogeny-based public-key cryptosystem based on isogenies between ordinary curves; 2010 Childs et al. presented a quantum subexponenal attack on Stolbunovs public-key cryptosystem; 2011 Jao and De Feo presented the Supersingular Isogeny Diffie-Hellman (SIDH) and a identification protocol; 2017 Jao et al. proposed Supersingular Isogeny Key Encapsulaon (SIKE) as a submission to NIST PQC call; 2018 Castryck et al. proposed a (Comutative)SIDH based on Couveignes construction. Latin American Week on Coding and Information 2018 9

  10. Retrospective 1996 Couveignes mentioned about isogenies in cryptography but only published in 2006; 2009 Charles et al presented hash functions constructions based on isogenies; 2010 Stolbunov presented first published isogeny-based public-key cryptosystem based on isogenies between ordinary curves; 2010 Childs et al. presented a quantum subexponenal attack on Stolbunovs public-key cryptosystem; 2011 Jao and De Feo presented the Supersingular Isogeny Diffie-Hellman (SIDH) and a identification protocol; 2017 Jao et al. proposed Supersingular Isogeny Key Encapsulaon (SIKE) as a submission to NIST PQC call; 2018 Castryck et al. proposed a (Comutative)SIDH based on Couveignes construction. Latin American Week on Coding and Information 2018 10

  11. Retrospective 1996 Couveignes mentioned about isogenies in cryptography but only published in 2006; 2009 Charles et al presented hash functions constructions based on isogenies; 2010 Stolbunov presented first published isogeny-based public-key cryptosystem based on isogenies between ordinary curves; 2010 Childs et al. presented a quantum subexponenal attack on Stolbunovs public-key cryptosystem; 2011 Jao and De Feo presented the Supersingular Isogeny Diffie-Hellman (SIDH) and a identification protocol; 2017 Jao et al. proposed Supersingular Isogeny Key Encapsulaon (SIKE) as a submission to NIST PQC call; 2018 Castryck et al. proposed a (Comutative)SIDH based on Couveignes construction. Latin American Week on Coding and Information 2018 11

  12. Retrospective 1996 Couveignes mentioned about isogenies in cryptography but only published in 2006; 2009 Charles et al presented hash functions constructions based on isogenies; 2010 Stolbunov presented first published isogeny-based public-key cryptosystem based on isogenies between ordinary curves; 2010 Childs et al. presented a quantum subexponenal attack on Stolbunovs public-key cryptosystem; 2011 Jao and De Feo presented the Supersingular Isogeny Diffie-Hellman (SIDH) and a identification protocol; 2017 Jao et al. proposed Supersingular Isogeny Key Encapsulaon (SIKE) as a submission to NIST PQC call; 2018 Castryck et al. proposed a (Comutative)SIDH based on Couveignes construction. Latin American Week on Coding and Information 2018 12

  13. Elliptic Curves An elliptic curve E over a field K = F q is a plane algebric curve defined by an equation of the form y 2 + a 1 xy + a 3 y = x 3 + a 2 x 2 + a 4 x + a 6 with a 1 , a 2 , ..., a 6 ∈ F q . • Short Weierstrass Model: y 2 = x 3 + Ax + B with A , B ∈ F q ; • 4 A 3 + 27 B 2 � = 0; • E ( F q ) = { ( x , y ) ∈ F q × F q : y 2 = x 3 + Ax + B } ∪ O forms an abelian group; • Hasse Theorem: # E ( F q ) = q + 1 − t with | t | ≤ 2 √ q ; • E is a supersingular curve over F q if, and only if, t ≡ 0 mod p , q = p n . Latin American Week on Coding and Information 2018 13

  14. Isogenies

  15. Isogenies • An isogeny is a non-constant rational map with the property of being a group homomorphism: φ : E 1 → E 2 such that φ ( P + Q ) = φ ( P ) + φ ( Q ) , P , Q ∈ E ( F q ); • We can identify, up to isomorphisms, an isogeny by its kernel; • For a separable isogeny, its degree is the number of points in its kernel; � � g 1 ( x , y ) , f 2 ( x , y ) f 1 ( x , y ) φ ( x , y ) = g 2 ( x , y ) with φ ( O ) = O and f i , g i , i ∈ { 1 , 2 } , polynomials. Latin American Week on Coding and Information 2018 15

  16. Isogenies: V` elu Formula Let E : y 2 = x 3 + Ax + B and E ′ be elliptic curves. In order to compute the l -isogeny between these curves with kernel F = F + ∪ F − we use the V` elu formula � � v P u P � φ x ( x , y ) = x + + x − x P ( x − x Q ) 2 P ∈ F + � � P g y y − y P − g x 2 y � P φ y ( x , y ) = y − u P ( x − x P ) 3 + v P ( x − x P ) 2 P ∈ F + u P = ( g y Q ) 2 , v P = 2 g x where P = ( x P , y P ) , P , g y g x P = 3 x 2 P + A , P = − 2 y P v = � P ∈ F + v P , w = � P ∈ F + u P + x P v P . The expression for E ′ will be E ′ : y 2 = x 3 + ( A − 5 v ) x + ( B − 7 w ). Latin American Week on Coding and Information 2018 16

  17. Cryptographic Constructions

  18. Cryptographic Constructions • Hash • Javad Doliskani and Geovandro C. C. F. Pereira and Paulo S. L. M. Barreto [DPB2018] • Denis X. Charles and Eyal Z. Goren and Kristin E. Lauter [CGL06]. • Digital Signature • Steven D. Galbraith and Christophe Petit and Javier Silva [GPS16]. • Encryption • Castryck, W., Lange, T., Martindale, C., Panny, L., and Renes, J. [CLMPR2018] • Takeshi Koshiba and Katsuyuki Takashima [KT16]. • Luca De Feo and David Jao and J´ erˆ ome Plˆ ut [FJP11]. Latin American Week on Coding and Information 2018 18

  19. SIDH - Supersingular Isogeny based Diffie-Hellman Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies [FJP11] • Public Parameters: • p = l e A A l e B B f ± 1, where l A , l B are small primes and e A , e B ∈ N . • E 0 a supersingular elliptic curve over F p 2 • P A , Q A , P B , Q B ∈ E 0 ( F p 2 ) such that � P A , Q A � = E 0 [ l e A A ] and � P B , Q B � = E 0 [ l e B B ] • Private Parameters: • m A , n A ∈ R Z l eA such that l A ∤ m A or l A ∤ n A A • m B , n B ∈ R Z l eB such that l B ∤ m B or l B ∤ n B B Latin American Week on Coding and Information 2018 19

  20. SIDH - Supersingular Isogeny based Diffie-Hellman Figure 1: SIDH [FJP11]. Latin American Week on Coding and Information 2018 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend