On Fast Calculation of Addition Chains for Isogeny-Based Cryptography

نویسندگان

  • Brian Koziel
  • Reza Azarderakhsh
  • David Jao
  • Mehran Mozaffari Kermani
چکیده

Addition chain calculations play a critical role in determining the e ciency of cryptosystems based on isogenies on elliptic curves. However, nding a minimal length addition chain is not easy; a generalized version of the problem, in which one must nd a chain that simultaneously forms each of a sequence of values, is NP-complete. For the special primes used in such cryptosystems, nding fast addition chains for nite eld arithmetic such as inversion and square root is also not easy. In this paper, we investigate the shape of smooth isogeny primes and propose new methods to calculate fast addition chains. Further, we also provide techniques to reduce the temporary register consumption of these large exponentials, applicable to both software and hardware implementations utilizing addition chains. Lastly, we utilize our procedures to compare multiple isogeny primes by the complexity of the addition chains.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Classical and Quantum Algorithms for Isogeny-based Cryptography

Isogeny-based cryptography using supersingular elliptic curves — most prominently, the constructions of De Feo-Jao-Plut — is one of the few practical candidates for post-quantum public key cryptography. Its formidable security claim is earned through the continual exploration of quantum algorithms for ‘isogeny problems’ and the assessment of the threat they pose to supersingular isogeny-based c...

متن کامل

Public-Key Cryptosystem Based on Isogenies

A new general mathematical problem, suitable for publickey cryptosystems, is proposed: morphism computation in a category of Abelian groups. In connection with elliptic curves over finite fields, the problem becomes the following: compute an isogeny (an algebraic homomorphism) between the elliptic curves given. The problem seems to be hard for solving with a quantum computer. ElGamal public-key...

متن کامل

Efficient Finite Field Multiplication for Isogeny Based Post Quantum Cryptography

Isogeny based post-quantum cryptography is one of the most recent addition to the family of quantum resistant cryptosystems. In this paper we propose an efficient modular multiplication algorithm for primes of the form p = 2 · 23 − 1 with b even, typically used in such cryptosystem. Our modular multiplication algorithm exploits the special structure present in such primes. We compare the effici...

متن کامل

FPGA-SIDH: High-Performance Implementation of Supersingular Isogeny Diffie-Hellman Key-Exchange Protocol on FPGA

To the best of our knowledge, we present the first hardware implementation of isogeny-based cryptography available in the literature. Particularly, we present the first implementation of the supersingular isogeny Diffie-Hellman (SIDH) key exchange, which features quantum-resistance. We optimize this design for speed by creating a high throughput multiplier unit, taking advantage of parallelizat...

متن کامل

A provably secure public key encryption scheme based on isogeny star

Public Key Encryption (PKE) scheme based on isogeny star has been proposed to be against the attack of the quantum computer for several years. But, there is no report about provable security PKE scheme based on isogeny star. In this paper, we propose a PKE scheme based on isogeny star and prove the security of the scheme in the random oracle.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016