On adaptive attacks against Jao-Urbanik's isogeny-based protocol

Andrea Basso, Peter Kutas, Simon-Philipp Merz, Christophe Petit, Charlotte Weitkaemper

Research output: Chapter in Book/Report/Conference proceedingConference contribution

25 Downloads (Pure)

Abstract

The k-SIDH protocol is a static-static isogeny-based key agreement protocol. At Mathcrypt 2018, Jao and Urbanik introduced a variant of this protocol which uses non-scalar automorphisms of special elliptic curves to improve its efficiency.

In this paper, we provide a new adaptive attack on Jao-Urbanik's protocol. The attack is a non-trivial adaptation of Galbraith-Petit-Shani-Ti's attack on SIDH (Asiacrypt 2016) and its extension to k-SIDH by Dobson-Galbraith-LeGrow-Ti-Zobernig (IACR eprint 2019).

Our attack provides a speedup compared to a naive application of Dobson et al's attack to Jao-Urbanik's scheme, exploiting its inherent structure. Estimating the security of k-SIDH and Jao-Urbanik's variant with respect to these attacks, k-SIDH provides better efficiency.
Original languageEnglish
Title of host publicationProgress in Cryptology - AFRICACRYPT 2020
Subtitle of host publication12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 – 22, 2020, Proceedings
EditorsAbderrahmane Nitaj, Amr Youssef
PublisherSpringer
Pages195-213
Number of pages19
Edition1
ISBN (Electronic)9783030519384
ISBN (Print)9783030519377
DOIs
Publication statusPublished - 5 Jul 2020
Event12th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2020 - Cairo, Egypt
Duration: 20 Jul 202022 Jul 2020

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume12174 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference12th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2020
Country/TerritoryEgypt
CityCairo
Period20/07/2022/07/20

Bibliographical note

Funding Information:
We would like to thank David Jao and David Urbanik for their valuable comments and feedback on this work. Furthermore, we are grateful to Samuel Dobson, Steven D. Galbraith, Jason LeGrow, Yan Bo Ti, and Lukas Zobernig for their helpful clarifications regarding the DGLTZ attack. Work by the second and fourth authors was supported by an EPSRC New Investigator grant (EP/S01361X/1).

Publisher Copyright:
© Springer Nature Switzerland AG 2020.

Keywords

  • Elliptic curves
  • Isogenies
  • k-SIDH
  • Adaptive attack

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'On adaptive attacks against Jao-Urbanik's isogeny-based protocol'. Together they form a unique fingerprint.

Cite this