Abstract
Choosing safe post-quantum parameters for the new CSIDH
isogeny-based key-exchange system requires concrete analysis of the cost of quantum attacks. The two main contributions to attack cost are the number of queries in hidden-shift algorithms and the cost of each query.
This paper analyzes algorithms for each query, introducing several new speedups while showing that some previous claims were too optimistic for the attacker. This paper includes a full computer-verified simulation of its main algorithm down to the bit-operation level.
isogeny-based key-exchange system requires concrete analysis of the cost of quantum attacks. The two main contributions to attack cost are the number of queries in hidden-shift algorithms and the cost of each query.
This paper analyzes algorithms for each query, introducing several new speedups while showing that some previous claims were too optimistic for the attacker. This paper includes a full computer-verified simulation of its main algorithm down to the bit-operation level.
Original language | English |
---|---|
Title of host publication | Advances in Cryptology - EUROCRYPT 2019 |
Publisher | Springer, Cham |
Pages | 409-441 |
ISBN (Electronic) | 978-3-030-17656-3 |
ISBN (Print) | 978-3-030-17655-6 |
DOIs | |
Publication status | E-pub ahead of print - 24 Apr 2019 |
Publication series
Name | |
---|---|
ISSN (Electronic) | 1611-3349 |