New Hybrid Method for Isogeny-Based Cryptosystems Using Edwards Curves

被引:9
作者
Kim, Suhri [1 ]
Yoon, Kisoon [2 ]
Kwon, Jihoon [3 ]
Park, Young-Ho [4 ]
Hong, Seokhie [1 ]
机构
[1] Korea Univ, Ctr Informat Secur Technol, Seoul 02841, South Korea
[2] NSHC, Seoul 08502, South Korea
[3] Samsung SDS Inc, Secur Algorithm Lab, Seoul 05510, South Korea
[4] Sejong Cyber Univ, Seoul 05000, South Korea
关键词
Elliptic curve cryptography; Elliptic curves; Computational efficiency; Quantum computing; Protocols; NIST; Isogeny; post-quantum cryptography; montgomery curves; Edwards curves; SIDH;
D O I
10.1109/TIT.2019.2938984
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Along with the resistance against quantum computers, isogeny-based cryptography offers attractive cryptosystems due to small key sizes and compatibility with the current elliptic curve primitives. While the state-of-the-art implementation uses Montgomery curves, which facilitates efficient elliptic curve arithmetic and isogeny computations, other forms of elliptic curves can be used to produce an efficient result. In this paper, we present the new hybrid method for isogeny-based cryptosystem using Edwards curves. Unlike the previous hybrid methods, we exploit Edwards curves for recovering the curve coefficients and Montgomery curves for other operations. To this end, we first carefully examine and compare the computational cost of Montgomery and Edwards isogenies. Then, we fine-tune and tailor Edwards isogenies in order to blend with Montgomery isogenies efficiently. Additionally, we present the implementation results of Supersingular Isogeny Diffie-Hellman (SIDH) key exchange using the proposed method. We demonstrate that our method outperforms the previously proposed hybrid method, and is as fast as Montgomery-only implementation. Our results show that proper use of Edwards curves for isogeny-based cryptosystem can be quite practical.
引用
收藏
页码:1934 / 1943
页数:10
相关论文
共 22 条
  • [11] Couveignes J.-M., 2006, Report 2006/291
  • [12] Hisil H., 2017, LNCS, V10625, P303, DOI [10.1007/978-3-319-70697-911, DOI 10.1007/978-3-319-70697-911]
  • [13] Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
    Jao, David
    De Feo, Luca
    [J]. POST-QUANTUM CRYPTOGRAPHY, 2011, 7071 : 19 - +
  • [14] Justus B, 2010, LECT NOTES COMPUT SC, V6434, P316, DOI 10.1007/978-3-642-16825-3_21
  • [15] NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM
    Koziel, Brian
    Jalali, Amir
    Azarderakhsh, Reza
    Jao, David
    Mozaffari-Kermani, Mehran
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 88 - 103
  • [16] Meyer M., 2017, 20171213 IACR CRYPT
  • [17] MONTGOMERY PL, 1987, MATH COMPUT, V48, P243, DOI 10.1090/S0025-5718-1987-0866113-7
  • [18] ANALOGUES OF VELU'S FORMULAS FOR ISOGENIES ON ALTERNATE MODELS OF ELLIPTIC CURVES
    Moody, Dustin
    Shumow, Daniel
    [J]. MATHEMATICS OF COMPUTATION, 2016, 85 (300) : 1929 - 1951
  • [19] Seo H., 2018, IACR T CRYPTOGR HARD, V2018, P1
  • [20] Stemness-Attenuating miR-503-3p as a Paracrine Factor to Regulate Growth of Cancer Stem Cells
    Seo, Minkoo
    Kim, Seung Min
    Woo, Eun Young
    Han, Ki-Cheol
    Park, Eun Joo
    Ko, Seongyeol
    Choi, Eun Wook
    Jang, Mihue
    [J]. STEM CELLS INTERNATIONAL, 2018, 2018