Cryptology ePrint Archive: Report 2019/1333

The Dark SIDH of Isogenies

Paul Bottinelli and Victoria de Quehen and Chris Leonardi and Anton Mosunov and Filip Pawlega and Milap Sheth

Abstract: Many isogeny-based cryptosystems are believed to rely on the hardness of the Supersingular Decision Diffie-Hellman (SSDDH) problem. However, most cryptanalytic efforts have treated the hardness of this problem as being equivalent to the more generic supersingular $\ell^e$-isogeny problem --- an established hard problem in number theory.

In this work, we shine some light on the possibility that the combination of two additional pieces of information given in practical SSDDH instances --- the image of the torsion subgroup, and the starting curve's endomorphism ring --- can lead to better attacks cryptosystems relying on this assumption. We show that SIKE/SIDH are secure against our techniques. However, in certain settings, e.g., multi-party protocols, our results may suggest a larger gap between the security of these cryptosystems and the $\ell^e$-isogeny problem.

Our analysis relies on the ability to find many endomorphisms on the base curve that have special properties. To the best of our knowledge, this class of endomorphisms has never been studied in the literature. We informally discuss the parameter sets where these endomorphisms should exist. We also present an algorithm which may provide information about additional torsion points under the party's private isogeny, which is of independent interest. Finally, we present a minor variation of the SIKE protocol that avoids exposing a known endomorphism ring.

Category / Keywords: public-key cryptography / isogenies, cryptanalysis, SIDH, SIKE

Date: received 19 Nov 2019

Contact author: victoria dequehen at isara com

Available format(s): PDF | BibTeX Citation

Version: 20191120:131323 (All versions of this report)

Short URL: ia.cr/2019/1333


[ Cryptology ePrint archive ]