Paper 2022/196
Generalising Fault Attacks to Genus Two Isogeny Cryptosystems
Abstract
In this paper, we generalise the SIDH fault attack and the SIDH loop-abort fault attacks on supersingular isogeny cryptosystems (genus-1) to genus-2. Genus-2 isogeny-based cryptosystems are generalisations of its genus-1 counterpart, as such, attacks on the latter are believed to generalise to the former. The point perturbation attack on supersingular elliptic curve isogeny cryptography has been shown to be practical. We show in this paper that this fault attack continues to be practical in genus-2, albeit with a few additional traces required. We also show that the loop-abort attack carries over to the genus-2 setting seamlessly. This article is a minor revision of the version accepted to the workshop Fault Diagnosis and Tolerance in Cryptography 2022 (FDTC 2022).
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. FDTC
- Keywords
- isogeny-based cryptography fault attack
- Contact author(s)
-
ari gzh @ gmail com
lchuwee @ dso org sg
yanbo ti @ gmail com - History
- 2022-10-25: last of 3 revisions
- 2022-02-20: received
- See all versions
- Short URL
- https://ia.cr/2022/196
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/196, author = {Ariana Goh and Chu-Wee Lim and Yan Bo Ti}, title = {Generalising Fault Attacks to Genus Two Isogeny Cryptosystems}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/196}, year = {2022}, url = {https://eprint.iacr.org/2022/196} }