An adaptive attack on 2-SIDH

Autor: Dobson, Samuel, Galbraith, Steven D., LeGrow, Jason, Ti, Yan Bo, Zobernig, Lukas
Zdroj: International Journal of Computer Mathematics: Computer Systems Theory; October 2021, Vol. 6 Issue: 4 p387-404, 18p
Abstrakt: We present a polynomial-time adaptive attack on the 2-SIDH protocol. The 2-SIDH protocol is a special instance of the countermeasure proposed by Azarderakhsh, Jao and Leonardi to perform isogeny-based key exchange with static keys in the presence of an adaptive attack. This countermeasure has also been recently explicitly proposed by Kayacan. Our attack extends the adaptive attack by Galbraith, Petit, Shani and Ti (GPST) to recover a static secret key using malformed points. The extension of GPST is non-trivial and requires learning additional information. In particular, the attack needs to recover intermediate elliptic curves in the isogeny path, and points on them. We also discuss how to extend the attack to k-SIDH when k>2 and explain that the attack complexity is exponential in k.
Databáze: Supplemental Index