New Hybrid Method for Isogeny-Based Cryptosystems Using Edwards Curves

被引:9
作者
Kim, Suhri [1 ]
Yoon, Kisoon [2 ]
Kwon, Jihoon [3 ]
Park, Young-Ho [4 ]
Hong, Seokhie [1 ]
机构
[1] Korea Univ, Ctr Informat Secur Technol, Seoul 02841, South Korea
[2] NSHC, Seoul 08502, South Korea
[3] Samsung SDS Inc, Secur Algorithm Lab, Seoul 05510, South Korea
[4] Sejong Cyber Univ, Seoul 05000, South Korea
关键词
Elliptic curve cryptography; Elliptic curves; Computational efficiency; Quantum computing; Protocols; NIST; Isogeny; post-quantum cryptography; montgomery curves; Edwards curves; SIDH;
D O I
10.1109/TIT.2019.2938984
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Along with the resistance against quantum computers, isogeny-based cryptography offers attractive cryptosystems due to small key sizes and compatibility with the current elliptic curve primitives. While the state-of-the-art implementation uses Montgomery curves, which facilitates efficient elliptic curve arithmetic and isogeny computations, other forms of elliptic curves can be used to produce an efficient result. In this paper, we present the new hybrid method for isogeny-based cryptosystem using Edwards curves. Unlike the previous hybrid methods, we exploit Edwards curves for recovering the curve coefficients and Montgomery curves for other operations. To this end, we first carefully examine and compare the computational cost of Montgomery and Edwards isogenies. Then, we fine-tune and tailor Edwards isogenies in order to blend with Montgomery isogenies efficiently. Additionally, we present the implementation results of Supersingular Isogeny Diffie-Hellman (SIDH) key exchange using the proposed method. We demonstrate that our method outperforms the previously proposed hybrid method, and is as fast as Montgomery-only implementation. Our results show that proper use of Edwards curves for isogeny-based cryptosystem can be quite practical.
引用
收藏
页码:1934 / 1943
页数:10
相关论文
共 22 条
  • [1] Azarderakhsh R., 2016, 2016672 IACR CRYPT E
  • [2] Azarderakhsh Reza, 2017, Supersingular Isogeny Key Encapsulation. Submission to the NIST Post-Quantum Standardization Project
  • [3] Bernstein DJ, 2008, LECT NOTES COMPUT SC, V5023, P389
  • [4] Bos J., IEEE T COMPUT
  • [5] Selecting elliptic curves for cryptography: an efficiency and security analysis
    Bos, Joppe W.
    Costello, Craig
    Longa, Patrick
    Naehrig, Michael
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (04) : 259 - 286
  • [6] Broker R., 2009, J. Comb. Numb. Theory, V1, P269
  • [7] Castryck W., 2008, IACR CRYPTOL EPRINT, V2008, P218
  • [8] Constructing elliptic curve isogenies in quantum subexponential time
    Childs, Andrew
    Jao, David
    Soukharev, Vladimir
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2014, 8 (01) : 1 - 29
  • [9] Costello C., 2016, SIDH LIB
  • [10] Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
    Costello, Craig
    Longa, Patrick
    Naehrig, Michael
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 572 - 601