Isogeny-based quantum-resistant encryption algorithm cracked by a single-core computer in one hour

The National Institute of Standards and Technology (NIST) recently announced the inaugural winners of a competition for post-quantum encryption and signature algorithms, including three lattice-based algorithms and one hash-based algorithm. The fact that an Isogeny-based quantum-resistant encryption candidate entering the fourth round of the competition is cracked by a single-core computer in an hour still underscores the risks associated with standardizing next-generation encryption algorithms. The attack was on an algorithm called SIKE – which stands for Supersingular Isogeny Key Encapsulation – which was cracked by a team from the University of Leuven. The researchers published the paper ” An Efficient Key Recovery Attack on SIDH (Preliminary Version) ” describing the attack on it. The basic protocol of SIKE is SIDH (Supersingular Isogeny Diffie-Hellman). The researchers used glue-and-split theory developed by mathematician Ernst Kani and tools designed by Everett W. Howe et al. One hour to get the encryption key used by SIKE. David Jao, co-inventor of SIKE, admits it was a surprise. Does this attack apply to other Isogeny-based algorithms? Mathematician Stephen Galbraith pointed out that this attack is specific to SIKE and does not apply to other Isogeny algorithms such as CSIDH or SQISign.

This article is reprinted from: https://www.solidot.org/story?sid=72350
This site is for inclusion only, and the copyright belongs to the original author.

Leave a Comment