Paper 2023/507
Low Memory Attacks on Small Key CSIDH
Abstract
Despite recent breakthrough results in attacking SIDH, the CSIDH protocol remains a secure post-quantum key exchange protocol with appealing properties. However, for obtaining efficient CSIDH instantiations one has to resort to small secret keys. In this work, we provide novel methods to analyze small key CSIDH, thereby introducing the representation method ---that has been successfully applied for attacking small secret keys in code- and lattice-based schemes--- also to the isogeny-based world.
We use the recently introduced Restricted Effective Group Actions (
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Published elsewhere. ACNS 2023
- Keywords
- IsogenyTime-Memory Trade-offRepresentation Technique
- Contact author(s)
-
jesus dominguez @ tii ae
andre r esser @ gmail com
sabrina kunzweiler @ math u-bordeaux fr
alex may @ rub de - History
- 2023-04-10: approved
- 2023-04-07: received
- See all versions
- Short URL
- https://ia.cr/2023/507
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2023/507, author = {Jesús-Javier Chi-Domínguez and Andre Esser and Sabrina Kunzweiler and Alexander May}, title = {Low Memory Attacks on Small Key {CSIDH}}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/507}, year = {2023}, url = {https://eprint.iacr.org/2023/507} }