Quantum Security Analysis of CSIDH

被引:70
作者
Bonnetain, Xavier [1 ,2 ]
Schrottenloher, Andre [2 ]
机构
[1] Sorbonne Univ, Coll Doctoral, F-75005 Paris, France
[2] Inria, Paris, France
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II | 2020年 / 12106卷
基金
欧洲研究理事会;
关键词
Post-quantum cryptography; Isogeny-based cryptography; Quantum cryptanalysis; Quantum circuits; Hidden shift problem; ALGORITHMS; REDUCTION;
D O I
10.1007/978-3-030-45724-2_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
CSIDH is a recent proposal for post-quantum non-interactive key-exchange, based on supersingular elliptic curve isogenies. It is similar in design to a previous scheme by Couveignes, Rostovtsev and Stolbunov, but aims at an improved balance between efficiency and security. In the proposal, the authors suggest concrete parameters in order to meet some desired levels of quantum security. These parameters are based on the hardness of recovering a hidden isogeny between two elliptic curves, using a quantum subexponential algorithm of Childs, Jao and Soukharev. This algorithm combines two building blocks: first, a quantum algorithm for recovering a hidden shift in a commutative group. Second, a computation in superposition of all isogenies originating from a given curve, which the algorithm calls as a black box. In this paper, we give a comprehensive security analysis of CSIDH. Our first step is to revisit three quantum algorithms for the abelian hidden shift problem from the perspective of non-asymptotic cost, with trade-offs between their quantum and classical complexities. Second, we complete the non-asymptotic study of the black box in the hidden shift algorithm. We give a quantum procedure that evaluates CSIDH-512 using less than 40 000 logical qubits. This allows us to show that the parameters proposed by the authors of CSIDH do not meet their expected quantum security.
引用
收藏
页码:493 / 522
页数:30
相关论文
共 45 条
[1]  
[Anonymous], SAGE DEV SAGEMATH SA
[2]  
[Anonymous], 1996, Electronic Colloquium on Computational Complexity
[3]  
[Anonymous], 2018, J MATH CRYPTOL
[4]   ON LOVASZ LATTICE REDUCTION AND THE NEAREST LATTICE POINT PROBLEM [J].
BABAI, L .
COMBINATORICA, 1986, 6 (01) :1-13
[5]  
Becker A, 2011, LECT NOTES COMPUT SC, V6632, P364, DOI 10.1007/978-3-642-20465-4_21
[6]   TIME-SPACE TRADE-OFFS FOR REVERSIBLE COMPUTATION [J].
BENNETT, CH .
SIAM JOURNAL ON COMPUTING, 1989, 18 (04) :766-776
[7]   Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies [J].
Bernstein, Daniel J. ;
Lange, Tanja ;
Martindale, Chloe ;
Panny, Lorenz .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II, 2019, 11477 :409-441
[8]   CSI-FiSh: Efficient Isogeny Based Signatures Through Class Group Computations [J].
Beullens, Ward ;
Kleinjung, Thorsten ;
Vercauteren, Frederik .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I, 2019, 11921 :227-247
[9]   A trade-off between classical and quantum circuit size for an attack against CSIDH [J].
Biasse, Jean-Francois ;
Bonnetain, Xavier ;
Pring, Benjamin ;
Schrottenloher, Andre ;
Youmans, William .
JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) :4-17
[10]   A Note on the Security of CSIDH [J].
Biasse, Jean-Francois ;
Iezzi, Annamaria ;
Jacobson, Michael J., Jr. .
PROGRESS IN CRYPTOLOGY, INDOCRYPT 2018, 2018, 11356 :153-168