### Optimal strategies for CSIDH

Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez

##### Abstract

Since its proposal in Asiacrypt 2018, the commutative isogeny-based key exchange protocol (CSIDH) has spurred considerable attention to improving its performance and re-evaluating its classical and quantum security guarantees. In this paper we discuss how the optimal strategies employed by the Supersingular Isogeny Diffie-Hellman (SIDH) key agreement protocol can be naturally extended to CSIDH. Furthermore, we report a software library that achieves moderate but noticeable performance speedups when compared against state-of-the-art implementations of CSIDH-512, which is the most popular CSIDH instantiation. We also report an estimated number of field operations for larger instantiations of this protocol, namely, CSIDH-1024 and CSIDH-1792.

Available format(s)
Category
Public-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
CSIDHisogeny-based cryptographypost-quantum cryptographykey exchange
Contact author(s)
jesus chidominguez @ tuni fi
francisco @ cs cinvestav mx
History
2020-08-05: last of 3 revisions
See all versions
Short URL
https://ia.cr/2020/417

CC BY

BibTeX

@misc{cryptoeprint:2020/417,
author = {Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez},
title = {Optimal strategies for CSIDH},
howpublished = {Cryptology ePrint Archive, Paper 2020/417},
year = {2020},
note = {\url{https://eprint.iacr.org/2020/417}},
url = {https://eprint.iacr.org/2020/417}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.