Abstract
The isogeny graphs of supersingular curves are one of the promising mathematical structures in postquantum cryptography algorithms. However, the recently reported attack on the SIDH protocol [1] demonstrates that the isogeny graphs require a more detailed investigation when applied to real protocols. In this study, we analyze the structure of the graphs of isogenies of degree \(\ell > 2\) and consider the set of vertices of a special type to which an attack on reconstruction of the path in the graph is applicable [7].
REFERENCES
Castryck, W. and Decru, T., An efficient key recovery attack on SIDH, Advances in Cryptology–EUROCRYPT 2023, Hazay, C. and Stam, M., Eds., Lecture Notes in Computer Science, vol. 14008, Cham: Springer, 2023, pp. 423–447. https://doi.org/10.1007/978-3-031-30589-4_15
Castryck-Decru Key Recovery Attack on SIDH. https://github.com/jack4818/Castryck-Decru-SageMath. Cited June 14, 2023.
Oudompheng, R., A note on implementing direct isogeny determination in the Castryck-Decru sike attack, 2022. https://www.normalesup.org/~oudomphe/textes/202208-castryck-decru-shortcut.pdf. Cited May 14, 2023.
Oudompheng, R. and Pope, G., A note on reimplementing the Castryck-Decru attack and lessons learned for SageMath, 2022. https://eprint.iacr.org/2022/1283.pdf. Cited May 17, 2023.
Damien, R., Breaking SIDH in polynomial time. https://eprint.iacr.org/2022/1038.pdf. Cited May 19, 2023.
Arpin, S., Camacho-Navarro, C., Lauter, K., Lim, J., Nelson, K., Scholl, T., and Sotáková, J., Adventures in Supersingularland, Exp. Math., 2023, vol. 32, no. 2, pp. 241–268. https://doi.org/10.1080/10586458.2021.1926009
Delfs, C. and Galbraith, S.D., Computing isogenies between supersingular elliptic curves over Fp, Des., Codes Cryptography, 2016, vol. 78, no. 2, pp. 425–440. https://doi.org/10.1007/s10623-014-0010-1
Silverman, J.H., Algorithmic aspects of elliptic curves, The Arithmetic of Elliptic Curves, Graduate Texts in Mathematics, vol. 106, New York: Springer, 2009, pp. 363–408. https://doi.org/10.1007/978-0-387-09494-6_11
Moriya, T., Masked-degree SIDH. https://eprint.iacr.org/2022/1019.pdf. Cited May 20, 2023.
Shor, P.W., Algorithms for quantum computation: Discrete logarithms and factoring, Proc. 35th Annu. Symp. on Foundations of Computer Science, Santa Fe, N.M., IEEE, 1994, pp. 124–134. https://doi.org/10.1109/sfcs.1994.365700
Funding
This work was supported by ongoing institutional funding. No additional grants to carry out or direct this particular research were obtained.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The authors of this work declare that they have no conflicts of interest.
Additional information
Translated by E. Smirnova
Publisher’s Note.
Allerton Press remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Kostin, S.O., Aleksandrova, E.B. Investigation of the Structure of the Isogeny Graph for Postquantum Cryptography Protocols. Aut. Control Comp. Sci. 57, 904–913 (2023). https://doi.org/10.3103/S0146411623080102
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411623080102