Efficient Algorithms for Supersingular Isogeny Diffie-Hellman

被引:146
作者
Costello, Craig [1 ]
Longa, Patrick [1 ]
Naehrig, Michael [1 ]
机构
[1] Microsoft Res, Redmond, WA 98052 USA
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I | 2016年 / 9814卷
关键词
Post-quantum cryptography; Diffie-Hellman key exchange; Supersingular elliptic curves; Isogenies; SIDH; MULTIPLICATION; SECURE;
D O I
10.1007/978-3-662-53018-4_21
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a new suite of algorithms that significantly improve the performance of supersingular isogeny Diffie-Hellman (SIDH) key exchange. Subsequently, we present a full-fledged implementation of SIDH that is geared towards the 128-bit quantum and 192-bit classical security levels. Our library is the first constant-time SIDH implementation and is up to 2.9 times faster than the previous best (non-constant-time) SIDH software. The high speeds in this paper are driven by compact, inversion-free point and isogeny arithmetic and fast SIDH-tailored field arithmetic: on an Intel Haswell processor, generating ephemeral public keys takes 46 million cycles for Alice and 52 million cycles for Bob, while computing the shared secret takes 44 million and 50 million cycles, respectively. The size of public keys is only 564 bytes, which is significantly smaller than most of the popular post-quantum key exchange alternatives. Ultimately, the size and speed of our software illustrates the strong potential of SIDH as a post-quantum key exchange candidate and we hope that these results encourage a wider cryptanalytic effort.
引用
收藏
页码:572 / 601
页数:30
相关论文
共 49 条
  • [1] [Anonymous], 2016413 CRYPT EPRINT
  • [2] [Anonymous], 2014, TECHNICAL REPORT
  • [3] [Anonymous], COMMUNICATION APR
  • [4] [Anonymous], 2004, LONDON MATH SOC LECT
  • [5] [Anonymous], 2015, IACR CRYPTOLOGY EPRI
  • [6] [Anonymous], 2002, THEORETICAL USE CACH
  • [7] [Anonymous], 20151075 CRYPT EPRIN
  • [8] [Anonymous], 2012, THESIS
  • [9] [Anonymous], COMMUNICATION FEB
  • [10] [Anonymous], 2016, 8105 NISTIR