How Not to Create an Isogeny-Based PAKE

被引:9
|
作者
Azarderakhsh, Reza [1 ]
Jao, David [2 ]
Koziel, Brian [1 ]
LeGrow, Jason T. [2 ,3 ]
Soukharev, Vladimir [4 ]
Taraskin, Oleg [5 ]
机构
[1] Florida Atlantic Univ, Dept Comp & Elect Engn & Comp Sci, Boca Raton, FL 33431 USA
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON, Canada
[3] Univ Waterloo, Inst Quantum Comp, Waterloo, ON, Canada
[4] Infosec Global, Toronto, ON, Canada
[5] Waves Platform, Moscow, Russia
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I | 2020年 / 12146卷
基金
加拿大自然科学与工程研究理事会;
关键词
Isogeny-based cryptography; Password-authenticated key exchange; AUTHENTICATED KEY EXCHANGE; SECURE;
D O I
10.1007/978-3-030-57808-4_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Isogeny-based key establishment protocols are believed to be resistant to quantum cryptanalysis. Two such protocols-supersingular isogeny Diffie-Hellman (SIDH) and commutative supersingular isogeny Diffie-Hellman (CSIDH)-are of particular interest because of their extremely small public key sizes compared with other post-quantum candidates. Although SIDH and CSIDH allow us to achieve key establishment against passive adversaries and authenticated key establishment (using generic constructions), there has been little progress in the creation of provably-secure isogeny-based password-authenticated key establishment protocols (PAKEs). This is in stark contrast with the classical setting, where the Diffie-Hellman protocol can be tweaked in a number of straightforward ways to construct PAKEs, such as EKE, SPEKE, PAK (and variants), J-PAKE, and Dragonfly. Although SIDH and CSIDH superficially resemble Diffie-Hellman, it is often difficult or impossible to "translate" these Diffie-Hellman-based protocols to the SIDH or CSIDH setting; worse still, even when the construction can be "translated," the resultant protocol may be insecure, even if the Diffie-Hellman based protocol is secure. In particular, a recent paper of Terada and Yoneyama and ProvSec 2019 purports to instantiate encrypted key exchange (EKE) over SIDH and CSIDH; however, there is a subtle problem which leads to an offline dictionary attack on the protocol, rendering it insecure. In this work we present man-in-the-middle and offline dictionary attacks on isogeny-based PAKEs from the literature, and explain why other classical constructions do not "translate" securely to the isogeny-based setting.
引用
收藏
页码:169 / 186
页数:18
相关论文
共 50 条
  • [1] Arithmetic Considerations for Isogeny-Based Cryptography
    Bos, Joppe W.
    Friedberger, Simon J.
    IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (07) : 979 - 990
  • [2] Pairing Optimizations for Isogeny-Based Cryptosystems
    Cai, Shiping
    Lin, Kaizhan
    Zhao, Chang-An
    IET INFORMATION SECURITY, 2024, 2024
  • [3] Verifiable Isogeny Walks: Towards an Isogeny-Based Postquantum VDF
    Chavez-Saab, Jorge
    Rodriguez-Henriquez, Francisco
    Tibouchi, Mehdi
    SELECTED AREAS IN CRYPTOGRAPHY, 2022, 13203 : 441 - 460
  • [4] A survey on isogeny-based cryptographic protocols
    Mishra, Sweta
    Mondal, Bhaskar
    Jha, Rishi Kumar
    WIRELESS NETWORKS, 2025, 31 (03) : 2993 - 3024
  • [5] Effective Pairings in Isogeny-Based Cryptography
    Reijnders, Krijn
    PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023, 2023, 14168 : 109 - 128
  • [6] Isogeny-Based Cryptographic Access Control
    Aleksandrova, E. B.
    Shtyrkina, A. A.
    Yarmak, A., V
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (08) : 803 - 812
  • [7] Isogeny-Based Cryptographic Access Control
    E. B. Aleksandrova
    A. A. Shtyrkina
    A. V. Yarmak
    Automatic Control and Computer Sciences, 2020, 54 : 803 - 812
  • [8] Performance evaluation of isogeny-based digital signature algorithms: introducing FIBS-fast isogeny-based digital signature
    Kim, Suhri
    Lee, Youngdo
    Yoon, Kisoon
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (03):
  • [9] Isogeny-Based Multi-signature Scheme
    de Goyon, Mathieu
    Miyaji, Atsuko
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 477 - 491
  • [10] Isogeny-Based Group Key Establishment Scheme
    Anastasia, Yarmak
    INTELLIGENT SUSTAINABLE SYSTEMS, WORLDS4 2022, VOL 2, 2023, 579 : 107 - 117