Auteurs : ... (Auteur de la Conférence)
... (Editeur )
Résumé :
Finding an explicit isogeny between two given isogenous elliptic curves over a finite field is considered a hard problem, even for quantum computers. In 2011 this led Jao and De Feo to propose a key exchange protocol that became known as SIDH, shorthand for Supersingular Isogeny Diÿe-Hellman. The security of SIDH does not rely on a pure isogeny problem, due to certain 'auxiliary' elliptic curve points that are exchanged during the protocol (for constructive reasons). In this talk I will discuss a break of SIDH that was discovered in collaboration with Thomas Decru. The attack uses isogenies between abelian surfaces and exploits the aforementioned auxiliary points, so it does not break the pure isogeny problem. I will also discuss improvements of this attack due to Maino et al. and Robert, as well as a countermeasure by Fouotsa et al., along with breaks of this countermeasure in some special cases.
Keywords : elliptic curves; isogenies; abelian surfaces; cryptography
Codes MSC :
14G15
- Finite ground fields
14G50
- Applications to coding theory and cryptography - application à la théorie de codes et à la cryptographie
14H40
- Jacobians, Prym varieties
14H52
- Elliptic curves
14K02
- Isogeny
|
Informations sur la Rencontre
Nom de la rencontre : AGCT - Arithmetic, Geometry, Cryptography and Coding Theory / AGCT - Arithmétique, géométrie, cryptographie et théorie des codes Dates : 05/06/2023 - 09/06/2023
Année de la rencontre : 2023
URL Congrès : https://conferences.cirm-math.fr/2889.html
DOI : 10.24350/CIRM.V.20055403
Citer cette vidéo:
(2023). An efficient break of the supersingular isogeny Diffie-Hellman protocol. CIRM. Audiovisual resource. doi:10.24350/CIRM.V.20055403
URI : http://dx.doi.org/10.24350/CIRM.V.20055403
|
Voir aussi
Bibliographie
- CASTRYCK, Wouter et DECRU, Thomas. An efficient key recovery attack on SIDH. In : Annual International Conference on the Theory and Applications of Cryptographic Techniques. Cham : Springer Nature Switzerland, 2023. p. 423-447. - http://dx.doi.org/10.1007/978-3-031-30589-4_15
- MAINO, Luciano, MARTINDALE, Chloe, PANNY, Lorenz, et al. A direct key recovery attack on SIDH. In : Annual International Conference on the Theory and Applications of Cryptographic Techniques. Cham : Springer Nature Switzerland, 2023. p. 448-471. - http://dx.doi.org/10.1007/978-3-031-30589-4_16
- ROBERT, Damien. Breaking SIDH in polynomial time. In : Annual International Conference on the Theory and Applications of Cryptographic Techniques. Cham : Springer Nature Switzerland, 2023. p. 472-503. - http://dx.doi.org/10.1007/978-3-031-30589-4_17