SIKE

From PQC WIKI
Revision as of 23:34, 12 May 2021 by Admin (talk | contribs) (1 revision imported)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Information

Authors

  • David Jao (University of Waterloo and evolution Q.Inc)
  • Reza Azarderakhsh (Florida Atlantic University and PQSecure Technologies LLC)
  • Matthew Campagna (Amazon)
  • Craig Costello (Microsoft Research)
  • Luca De Feo (Université de Versailles – Saint-Quentin)
  • Basil Hess (Infosec Global Switzerland)
  • Amir Jalali (LinkedIn Corporation)
  • Brian Koziel (Texas Instruments)
  • Brian LaMacchia (Microsoft Research)
  • Patrick Longa (Microsoft Research)
  • Michael Naehrig (Microsoft Research)
  • Geovandro Pereira (University of Waterloo and evolution Q.Inc)
  • Joost Renes (Radboud University)
  • Vladimir Soukharev (Infosec Global Canada)
  • David Urbanik (University of Toronto)
  • Koray Karabina (National Research Council, Canada)
  • Aaron Hutchinson (University of Waterloo, Canada)


Official Links

Related Articles

A Compact and Scalable Hardware/Software Co-design of SIKE
Pedro Maat C. Massolino and Patrick Longa and Joost Renes and Lejla Batina.
CHES-2020, 14 Jan 2020.

The Dark SIDH of Isogenies
Paul Bottinelli and Victoria de Quehen and Chris Leonardi and Anton Mosunov and Filip Pawlega and Milap Sheth.
Cryptology ePrint Archive: Report 2019/1333, 19 Nov 2019.

B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
Craig Costello.
Cryptology ePrint Archive: Report 2019/1145, 3 Oct 2019.

SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation
Brian Koziel and A-Bon Ackie and Rami El Khatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani.
Cryptology ePrint Archive: Report 2019/711.

SIKE Round 2 Speed Record on ARM Cortex-M4
Hwajeong soe and Amir Jalali and Reza Azarderakhsh.
Cryptology ePrint Archive: Report 2019/535, 20 May 2019.

Improved Classical Cryptanalysis of SIKE in Practice
Craig Costello and Patrick Longa and Michael Naehrig and Joost Renes and Fernando Virdia.
IACR-PKC-2020.

SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange
Hwajeong Seo and Zhe Liu and Patrick Longa and Zhi Hu.
CHES-2018, 2018.

A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies
Patrick Longa.
Cryptology ePrint Archive: Report 2018/267, 2018.


Summary Tables

ROUND 1

Description isogeny

Isogenies

Assumption SIDH
Functionality KEM
Public Key (bytes)
  • level 1: 378
  • level 3: 564, 434
  • level 5: 726
Secret Key (bytes)
  • level 1: 434
  • level 3: 644
  • level 5: 826
CIPH/SIG (bytes)
  • level 1: 402
  • level 3: 596
  • level 5: 766
Security

Type

IND-CCA (HHK)


ROUND 2

SIKE SIKE_compressed
Description isogeny

Isogenies

Assumption SIDH
Functionality KEM
Public Key

(bytes)

  • level 1: 330
  • level 2: 378
  • level 3: 462
  • level 5: 564
  • level 1: 196
  • level 2: 224
  • level 3:273
  • level 5: 331
Secret Key

(bytes)

  • level 1: 374
  • level 2: 434
  • level 3: 524
  • level 5: 644
  • level 1: 239
  • level 2: 280
  • level 3:336
  • level 5: 413
CIPH/SIG

(bytes)

  • level 1: 346
  • level 2: 402
  • level 3: 486
  • level 5: 596
  • level 1: 209
  • level 2: 248
  • level 3:297
  • level 5: 363
Security

Type

IND-CCA (HHK)