Introduction To Supersingular Isogeny Di
Introduction To Supersingular Isogeny Di
classical machines, the best known attacks would take against classical computers is O(p 4 ), while the secu-
exponential time, however, quantum computers are rity against quantum computers has been theorized
1
1
j-Invariant The j-invariant is a descriptor that can
be computed for any particular curve using said
curves parameters. Most importantly, isomorphic
curves will always share the same j-invariant value.
The exact equation for the j-invariant will vary de-
pending on the underlying form of the elliptic curve.
In the case of elliptic curves in the Weierstrass form,
the j-invariant is calculated as follows:
4a3
j(E) = 1728 · 4a3 +27b2
Figure 1: Visual Representation of SIDH-KEX Supersingular curves While it might seem a bit
confusing, supersingular curves are non-singular el-
liptic curves as one would expect to find in other el-
key exchange alternatives. This latest implementa- liptic curve scheme. The term “supersingular ” actu-
tion has been added to the Open Quantum Safe’s ally refers to the fact that they have “singular” values
“OpenSSL” project to be used for Internet applica- of the j-invariant and its Hasse invariant is 0. Refer
tions 2 . to section 4.3 for a concrete curve suggestion.
2
4.2 Key Exchange 5 Future Work
- Party A While SIDH seem very promising, there are still some
1. Randomly generate ma , na issues that remain to be solved. Current implemen-
2. Ra = [ma ]Pa + [na ]Qa tations assume both parties are honest peers, and
3. φa : E → Ea = E/hRa i thus, an misbehaving/attacking party could leak in-
4. Pb′ , Q′b = φa (Pb ), φa (Qb ) formation and weaken then security of the scheme.
5. Send (Ea , Pb′ , Q′b ) to Party B Another issue is the lack of crypto-analitic research
6. Receive (Eb , Pa′ , Q′a ) from Party B done for this scheme, as the literature in which one
7. Calculate Sab = [ma ]Pa′ + [na ]Q′a can rely is rather limited.
8. φab = Ea → Eab = Ea /hSab i. Being a relatively new field, there are still many un-
9. Compute k = jab = j-invariant(Eab ) knowns as to what supersingular isogenies can also be
used for. Aside from key exchange, some researchers
- Party B have also worked on applying supersingular curves to
1. Randomly generate mb , nb build digital signature schemes [7, 8].
2. Rb = [mb ]Pb + [nb ]Qb However, with the recent promising developments
3. φb : E → Eb = E/hRb i in SIDH, work with supersingular curves is bound to
4. Pa′ , Q′a = φb (Pa ), φb (Qa ) gather more research in the upcoming years.
5. Send (Eb , Pa′ , Q′a ) to Party A
6. Receive (Ea , Pb′ , Q′b ) from Party A
7. Calculate Sba = [mb ]Pb′ + [nb ]Q′b References
8. φba = Ea → Eba = Eb /hSba i.
9. Compute k ′ = jba = j-invariant(Eba ) [1] D. J. Bernstein, “Introduction to post-quantum
cryptography,” in Post-Quantum Cryptography,
Notice that since both curves are isogneous to each pp. 1–14, Springer, 2009.
other, they will have the same j-invariant. As such,
[2] D. Jao and L. De Feo, “Towards quantum-
the shared key k calculated by both parties will be
resistant cryptosystems from supersingular ellip-
the same.
tic curve isogenies,” in QCrypto 2011, pp. 19–34,
Springer Berlin Heidelberg, 2011.
3
[6] J. Vélu, “Isogénies entre courbes elliptiques,” in
CR Acad. Sci. Paris Sér. AB, vol. 273, pp. A238–
A241, 1971.
[7] D. Jao and V. Soukharev, “Isogeny-based
quantum-resistant undeniable signatures,” in In-
ternational Workshop on Post-Quantum Cryptog-
raphy, pp. 160–179, Springer, 2014.
[8] X. Sun, H. Tian, and Y. Wang, “Toward
quantum-resistant strong designated verifier sig-
nature,” in International Journal of Grid and
Utility Computing 4, vol. 5, pp. 80–86, Inder-
science Publishers Ltd, 2014.