Skip to main content

2020 | OriginalPaper | Buchkapitel

Improved Classical Cryptanalysis of SIKE in Practice

verfasst von : Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia

Erschienen in: Public-Key Cryptography – PKC 2020

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The main contribution of this work is an optimized implementation of the van Oorschot-Wiener (vOW) parallel collision finding algorithm. As is typical for cryptanalysis against conjectured hard problems (e. g. factoring or discrete logarithms), challenges can arise in the implementation that are not captured in the theory, making the performance of the algorithm in practice a crucial element of estimating security. We present a number of novel improvements, both to generic instantiations of the vOW algorithm finding collisions in arbitrary functions, and to its instantiation in the context of the supersingular isogeny key encapsulation (SIKE) protocol, that culminate in an improved classical cryptanalysis of the computational supersingular isogeny (CSSI) problem. In particular, we present a scalable implementation that can be applied to the Round-2 parameter sets of SIKE that can be used to give confidence in their security levels.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
In our scenario, many collisions are encountered before the golden collision is found. Starting new trails (rather than continuing on from distinguished points) avoids falling into cycles and repeatedly detecting the same collisions [23, p. 6, Footnote 5].
 
2
Of course, this strategy is not useful for a distributed attack on an actual cryptographically sized problem instance. It only aids the efficiency of small-sized experiments in order to get a better understanding of the algorithm.
 
3
The extreme case, when the full isogeny tree from one side is precomputed, corresponds to the meet-in-the-middle algorithm as described by Adj et al. [1].
 
4
This slightly changes how an element \(r_0 + r_12^{\varDelta }\in \mathbb {Z}_{2^{e-2}}\), for \(r_0\in \mathbb {Z}_{2^{\varDelta }}\) and \(r_1\in \mathbb {Z}_{2^{e-2-\varDelta }}\), corresponds to an isogeny. Instead of kernel \(\langle P + [r_0+r_12^{\varDelta }]Q\rangle \), it now gives rise to the kernel \(\langle P + [r_0 + r_12^{\varDelta +1}]Q\rangle \). This has no impact on the algorithm.
 
Literatur
2.
Zurück zum Zitat Beazley, D.M.: SWIG: an easy to use tool for integrating scripting languages with C and C++. In: USENIX Tcl/Tk Workshop. USENIX Association (1996) Beazley, D.M.: SWIG: an easy to use tool for integrating scripting languages with C and C++. In: USENIX Tcl/Tk Workshop. USENIX Association (1996)
3.
Zurück zum Zitat De Feo, L., Jao, D., Plût, J.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. J. Math. Cryptol. 8(3), 209–247 (2014)MathSciNetMATH De Feo, L., Jao, D., Plût, J.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. J. Math. Cryptol. 8(3), 209–247 (2014)MathSciNetMATH
4.
Zurück zum Zitat Delfs, C., Galbraith, S.D.: Computing isogenies between supersingular elliptic curves over \(\mathbb{F}_p\). Des. Codes Crypt. 78(2), 425–440 (2016)MathSciNetCrossRef Delfs, C., Galbraith, S.D.: Computing isogenies between supersingular elliptic curves over \(\mathbb{F}_p\). Des. Codes Crypt. 78(2), 425–440 (2016)MathSciNetCrossRef
5.
Zurück zum Zitat Grover, L.K.: A fast quantum mechanical algorithm for database search. In: STOC 1996. ACM (1996) Grover, L.K.: A fast quantum mechanical algorithm for database search. In: STOC 1996. ACM (1996)
7.
Zurück zum Zitat Jao, D., et al.: SIKE: Supersingular isogeny key encapsulation (2017). Manuscript available at sike.org/ Jao, D., et al.: SIKE: Supersingular isogeny key encapsulation (2017). Manuscript available at sike.​org/​
10.
Zurück zum Zitat Lenstra Jr., H.W.: Complex multiplication structure of elliptic curves. J. Number Theory 56(2), 227–241 (1996)MathSciNetCrossRef Lenstra Jr., H.W.: Complex multiplication structure of elliptic curves. J. Number Theory 56(2), 227–241 (1996)MathSciNetCrossRef
11.
Zurück zum Zitat Mestre, J.-F.: La méthode des graphes. Exemples et applications. In: Proceedings of the International Conference on Class Numbers and Fundamental Units of Algebraic Number Fields (Katata), pp. 217–242 (1986) Mestre, J.-F.: La méthode des graphes. Exemples et applications. In: Proceedings of the International Conference on Class Numbers and Fundamental Units of Algebraic Number Fields (Katata), pp. 217–242 (1986)
13.
Zurück zum Zitat Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Math. Comput. 48(177), 243–264 (1987)MathSciNetCrossRef Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Math. Comput. 48(177), 243–264 (1987)MathSciNetCrossRef
15.
Zurück zum Zitat OpenMP Architecture Review Board. OpenMP Application Program Interface Version 4.5, November 2015 OpenMP Architecture Review Board. OpenMP Application Program Interface Version 4.5, November 2015
18.
Zurück zum Zitat Sedgewick, R., Szymanski, T.G., Yao, A.C.: The complexity of finding cycles in periodic functions. SIAM J. Comput. 11(2), 376–390 (1982)MathSciNetCrossRef Sedgewick, R., Szymanski, T.G., Yao, A.C.: The complexity of finding cycles in periodic functions. SIAM J. Comput. 11(2), 376–390 (1982)MathSciNetCrossRef
19.
Zurück zum Zitat Shanks, D.: Class number, a theory of factorization, and genera. In: Proceedings of Symposium Pure Math, vol. 20, pp. 415–440 (1971) Shanks, D.: Class number, a theory of factorization, and genera. In: Proceedings of Symposium Pure Math, vol. 20, pp. 415–440 (1971)
21.
Zurück zum Zitat Szegedy, M.: Quantum speed-up of Markov chain based algorithms. In: FOCS 2004, pp. 32–41. IEEE (2004) Szegedy, M.: Quantum speed-up of Markov chain based algorithms. In: FOCS 2004, pp. 32–41. IEEE (2004)
22.
24.
Zurück zum Zitat van Vredendaal, C.: Reduced memory meet-in-the-middle attack against the NTRU private key. LMS J. Comput. Math. 19(A), 43–57 (2016)MathSciNetCrossRef van Vredendaal, C.: Reduced memory meet-in-the-middle attack against the NTRU private key. LMS J. Comput. Math. 19(A), 43–57 (2016)MathSciNetCrossRef
25.
Zurück zum Zitat Vélu, J.: Isogénies entre courbes elliptiques. Comptes Rendus de l’Académie des Sciences des Paris 273, 238–241 (1971)MathSciNetMATH Vélu, J.: Isogénies entre courbes elliptiques. Comptes Rendus de l’Académie des Sciences des Paris 273, 238–241 (1971)MathSciNetMATH
Metadaten
Titel
Improved Classical Cryptanalysis of SIKE in Practice
verfasst von
Craig Costello
Patrick Longa
Michael Naehrig
Joost Renes
Fernando Virdia
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-45388-6_18