Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH

Abstract The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. SIDH operates on supersingular elliptic curves defined over Fp2, where p is a large prime number of the form p=4eA3eB−1 and eA and eB are positive integers such that 4eA≈3eB. A va...

Full description

Saved in:
Bibliographic Details
Main Authors: Daniel Cervantes‐Vázquez, Eduardo Ochoa‐Jiménez, Francisco Rodríguez‐Henríquez
Format: Article
Language:English
Published: Wiley 2021-09-01
Series:IET Information Security
Subjects:
Online Access:https://doi.org/10.1049/ise2.12027
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832558672277929984
author Daniel Cervantes‐Vázquez
Eduardo Ochoa‐Jiménez
Francisco Rodríguez‐Henríquez
author_facet Daniel Cervantes‐Vázquez
Eduardo Ochoa‐Jiménez
Francisco Rodríguez‐Henríquez
author_sort Daniel Cervantes‐Vázquez
collection DOAJ
description Abstract The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. SIDH operates on supersingular elliptic curves defined over Fp2, where p is a large prime number of the form p=4eA3eB−1 and eA and eB are positive integers such that 4eA≈3eB. A variant of the SIDH protocol, dubbed extended SIDH (eSIDH), is presented. The eSIDH makes use of primes of the form p=4eAℓBeBℓCeCf−1. Here ℓB and ℓC are two small prime numbers; f is a cofactor; and eA, eB, and eC are positive integers such that 4eA≈ℓBeBℓCeC. It is shown that for many relevant instantiations of the SIDH protocol, this new family of primes enjoys faster field arithmetic than the one associated with traditional SIDH primes. Furthermore, its richer opportunities for parallelism yield a noticeable speed‐up factor when implemented on multicore platforms. A supersingular isogeny key encapsulation (SIKE) instantiation using the prime eSIDH‐p765 yields an acceleration factor of 1.06, 1.15 and 1.14 over a SIKE instantiation with the prime SIKE‐p757 when implemented on k = {1, 2, 3}‐core processors. To the authors’ knowledge, this work reports the first multicore implementation of SIDH and SIKE.
format Article
id doaj-art-99244b68c8be43e48baace3435280a7b
institution Kabale University
issn 1751-8709
1751-8717
language English
publishDate 2021-09-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-99244b68c8be43e48baace3435280a7b2025-02-03T01:31:55ZengWileyIET Information Security1751-87091751-87172021-09-0115536437410.1049/ise2.12027Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDHDaniel Cervantes‐Vázquez0Eduardo Ochoa‐Jiménez1Francisco Rodríguez‐Henríquez2Center for Research and Advanced Studies of the Center for Research and Advanced Studies of National Polytechnic Institute Computer Science Department Av. Instituto Politecnico Nacional 2508 Mexico City MexicoCenter for Research and Advanced Studies of the Center for Research and Advanced Studies of National Polytechnic Institute Computer Science Department Av. Instituto Politecnico Nacional 2508 Mexico City MexicoCenter for Research and Advanced Studies of the Center for Research and Advanced Studies of National Polytechnic Institute Computer Science Department Av. Instituto Politecnico Nacional 2508 Mexico City MexicoAbstract The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. SIDH operates on supersingular elliptic curves defined over Fp2, where p is a large prime number of the form p=4eA3eB−1 and eA and eB are positive integers such that 4eA≈3eB. A variant of the SIDH protocol, dubbed extended SIDH (eSIDH), is presented. The eSIDH makes use of primes of the form p=4eAℓBeBℓCeCf−1. Here ℓB and ℓC are two small prime numbers; f is a cofactor; and eA, eB, and eC are positive integers such that 4eA≈ℓBeBℓCeC. It is shown that for many relevant instantiations of the SIDH protocol, this new family of primes enjoys faster field arithmetic than the one associated with traditional SIDH primes. Furthermore, its richer opportunities for parallelism yield a noticeable speed‐up factor when implemented on multicore platforms. A supersingular isogeny key encapsulation (SIKE) instantiation using the prime eSIDH‐p765 yields an acceleration factor of 1.06, 1.15 and 1.14 over a SIKE instantiation with the prime SIKE‐p757 when implemented on k = {1, 2, 3}‐core processors. To the authors’ knowledge, this work reports the first multicore implementation of SIDH and SIKE.https://doi.org/10.1049/ise2.12027cryptographic protocolspublic key cryptography
spellingShingle Daniel Cervantes‐Vázquez
Eduardo Ochoa‐Jiménez
Francisco Rodríguez‐Henríquez
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
IET Information Security
cryptographic protocols
public key cryptography
title Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
title_full Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
title_fullStr Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
title_full_unstemmed Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
title_short Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
title_sort extended supersingular isogeny diffie hellman key exchange protocol revenge of the sidh
topic cryptographic protocols
public key cryptography
url https://doi.org/10.1049/ise2.12027
work_keys_str_mv AT danielcervantesvazquez extendedsupersingularisogenydiffiehellmankeyexchangeprotocolrevengeofthesidh
AT eduardoochoajimenez extendedsupersingularisogenydiffiehellmankeyexchangeprotocolrevengeofthesidh
AT franciscorodriguezhenriquez extendedsupersingularisogenydiffiehellmankeyexchangeprotocolrevengeofthesidh