...
【24h】

An adaptive attack on 2-SIDH

机译:对2-SIDH的自适应攻击

获取原文
获取原文并翻译 | 示例
           

摘要

We present a polynomial-time adaptive attack on the 2-SIDH protocol. The 2-SIDH protocol is a special instance of the countermeasure proposed by Azarderakhsh, Jao and Leonardi to perform isogeny-based key exchange with static keys in the presence of an adaptive attack. This countermeasure has also been recently explicitly proposed by Kayacan. Our attack extends the adaptive attack by Galbraith, Petit, Shani and Ti (GPST) to recover a static secret key using malformed points. The extension of GPST is non-trivial and requires learning additional information. In particular, the attack needs to recover intermediate elliptic curves in the isogeny path, and points on them. We also discuss how to extend the attack to k-SIDH when k > 2 and explain that the attack complexity is exponential in k.
机译:我们对2-SIDH协议提供了一种多项式适应性攻击。 2-SIDH协议是Azarderakhshshshshshshshshshshshshshshshshshshshshshshshshshs,Jao和Leonardi在存在适应攻击情况下使用静态键进行基于静态密钥的特殊情况。明确提出了明确提出了这一对策。我们的攻击通过Galbraith,Petit,Shani和Ti(GPST)扩展了自适应攻击,以恢复使用畸形点来恢复静态秘密密钥。 GPST的扩展是非微不足道的,需要学习其他信息。特别是,攻击需要在基因发生路径中恢复中间椭圆曲线,并指向它们。我们还讨论如何将攻击扩展到K-SIDH,然后解释攻击复杂性在k中是指数级的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号