Improved Torsion-Point Attacks on SIDH Variants

نویسندگان

چکیده

SIDH is a post-quantum key exchange algorithm based on the presumed difficulty of finding isogenies between supersingular elliptic curves. However, and related cryptosystems also reveal additional information: restriction secret isogeny to subgroup curve (torsion-point information). Petit [31] was first demonstrate that torsion-point information could noticeably lower isogenies. In particular, showed “overstretched” parameterizations be broken in polynomial time. this did not impact security any proposed literature. The contribution paper twofold: First, we strengthen techniques by exploiting coming from dual Frobenius isogeny. This extends attacks considerably. our yield classical attack completely breaks n-party group [2], introduced as GSIDH [17], for 6 parties or more, quantum 3 more improves best known asymptotic complexity. We provide Magma implementation parties. give full range parameters which apply. Second, construct variants designed weak against attacks; includes backdoor choices starting curve, well base-field prime. stress results do degrade of, weakness in, NIST submission SIKE [20].

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Fixed Point Attacks on GOST2 Block Cipher

GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...

متن کامل

Improved Integral Attacks on Rijndael

In this paper, we present some improved integral attacks on Rijndael whose block sizes are larger than 128 bits. We will introduce some 4-round distinguishers for Rijndael with large blocks proposed by Marine Minier (AFRICACRYPT 2009), and propose a new 4th-order 4-round distinguisher for Rijndael-192. Based on these distinguishers, together with the partial sum technique proposed by Niels Ferg...

متن کامل

Improved Integral Attacks on MISTY1

We present several integral attacks on MISTY1 using the FO Relation, which is derived from Sakurai-Zheng Property used in previous attacks. The FO Relation is a more precise form of the Sakurai-Zheng Property such that the functions in the FO Relation depend on 16-bit inputs instead of 32-bit inputs used in previous attacks, and that the functions do not change for different keys while previous...

متن کامل

Improved Attacks on Full GOST

GOST is a well known block cipher which was developed in the Soviet Union during the 1970’s as an alternative to the US-developed DES. In spite of considerable cryptanalytic effort, until very recently there were no published single key attacks against its full 32-round version which were faster than the 2 time complexity of exhaustive search. In February 2011, Isobe used in a novel way the pre...

متن کامل

Improved Timing Attacks on ECDSA

We improve the timing attack on ECDSA in [1] by Brumley and Tuveri. We use the Gaussian heuristic to analyse the length of error vectors in the lattice Close Vector Problem in order to determine the problems which are theoretically solvable. Then we cost each solution using a strengthened lattice reduction algorithm and Schnorr-Euchner enumeration to determine which problems are practically sol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-84252-9_15