Optimizations and Practicality of High-Security CSIDH
Authors
Fabio Campos, Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Michael Meyer, Krijn Reijnders, Francisco Rodríguez-Henríquez, Peter Schwabe, Thom Wiggers
Fabio Campos
RheinMain University of Applied Sciences, Wiesbaden, Germany campos at sopmac dot de
Jorge Chávez-Saab
Cryptography Research Center, Technology Innovation Institute, Abu Dhabi, United Arab Emirates jorge dot saab at tii dot ae
Jesús-Javier Chi-Domínguez
Cryptography Research Center, Technology Innovation Institute, Abu Dhabi, United Arab Emirates jesus dot dominguez at tii dot ae
Michael Meyer
University of Regensburg, Regensburg, Germany michael at random-oracles dot org
Krijn Reijnders
Radboud University, Nijmegen, The Netherlands krijn at cs dot ru dot nl
Francisco Rodríguez-Henríquez
Cryptography Research Center, Technology Innovation Institute, Abu Dhabi, United Arab Emirates francisco dot rodriguez at tii dot ae
Peter Schwabe
Max Planck Institute for Security and Privacy, Bochum, Germany
Radboud University, Nijmegen, The Netherlands peter at cryptojedi dot org
Thom Wiggers
PQShield, Nijmegen, The Netherlands thom at thomwiggers dot nl
Abstract
In this work, we assess the real-world practicality of CSIDH, an isogeny-based non-interactive key exchange. We provide the first thorough assessment of the practicality of CSIDH in higher parameter sizes for conservative estimates of quantum security, and with protection against physical attacks.
This requires a three-fold analysis of CSIDH. First, we describe two approaches to efficient high-security CSIDH implementations, based on SQALE and CTIDH. Second, we optimize such high-security implementations, on a high level by improving several subroutines, and on a low level by improving the finite field arithmetic. Third, we benchmark the performance of high-security CSIDH. As a stand-alone primitive, our implementations outperform previous results by a factor up to 2.53×.
As a real-world use case considering network protocols, we use CSIDH in TLS variants that allow early authentication through a NIKE. Although our instantiations of CSIDH have smaller communication requirements than post-quantum KEM and signature schemes, even our highly-optimized implementations result in too-large handshake latency (tens of seconds), showing that CSIDH is only practical in niche cases.
References
[ACR22]
Gora Adj, Jesús-Javier Chi-Domínguez, and Francisco Rodríguez-Henríquez.
Karatsuba-based square-root Vélu's formulas applied to two isogeny-based protocols.
Journal of Cryptographic Engineering, 2022.
https://doi.org/10.1007/s13389-022-00293-y.
Reza Azarderakhsh, David Jao, and Christopher Leonardi.
Post-quantum static-static key agreement using multiple protocol instances.
In Carlisle Adams and Jan Camenisch, editors, SAC 2017, volume 10719 of LNCS, 45–63. Springer, Heidelberg, 2017.
https://doi.org/10.1007/978-3-319-72565-9_3.
Yawning Angel, Benjamin Dowling, Andreas Hülsing, Peter Schwabe, and Florian Weber.
Post quantum noise.
In Heng Yin, Angelos Stavrou, Cas Cremers, and Elaine Shi, editors, ACM CCS 2022, 97–109. ACM Press, 2022.
https://doi.org/10.1145/3548606.3560577.
Gustavo Banegas, Daniel J. Bernstein, Fabio Campos, Tung Chou, Tanja Lange, Michael Meyer, Benjamin Smith, and Jana Sotáková.
CTIDH: faster constant-time CSIDH.
IACRTCHES, 2021(4):351–387, 2021.
https://doi.org/10.46586/tches.v2021.i4.351-387.
Jean-Claude Bajard and Sylvain Duquesne.
Montgomery-friendly primes and applications to cryptography.
Journal of Cryptographic Engineering, 11(4):399–415, 2021.
https://doi.org/10.1007/s13389-021-00260-z.
Daniel J. Bernstein, Tanja Lange, Chloe Martindale, and Lorenz Panny.
Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies.
In Yuval Ishai and Vincent Rijmen, editors, EUROCRYPT 2019, Part II, volume 11477 of LNCS, 409–441. Springer, Heidelberg, 2019.
https://doi.org/10.1007/978-3-030-17656-3_15.
Daniel J. Bernstein, Luca De Feo, Antonin Leroux, and Benjamin Smith.
Faster computation of isogenies of large prime degree.
In ANTS XIV – Proceedings of the Fourteenth Algorithmic Number Theory Symposium. MSP, 2020.
Ward Beullens, Thorsten Kleinjung, and Frederik Vercauteren.
CSI-FiSh: efficient isogeny based signatures through class group computations.
In Steven D. Galbraith and Shiho Moriai, editors, ASIACRYPT 2019, Part I, volume 11921 of LNCS, 227–247. Springer, Heidelberg, 2019.
https://doi.org/10.1007/978-3-030-34578-5_9.
Joppe W. Bos, Craig Costello, Michael Naehrig, and Douglas Stebila.
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem.
In 2015 IEEE Symposium on Security and Privacy, 553–570. IEEE Computer Society Press, 2015.
https://doi.org/10.1109/SP.2015.40.
Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, and Douglas Stebila.
Towards post-quantum security for Signal's X3DH handshake.
In Orr Dunkelman, Michael J. Jacobson Jr., and Colin O'Flynn, editors, SAC 2020, volume 12804 of LNCS, 404–430. Springer, Heidelberg, 2020.
https://doi.org/10.1007/978-3-030-81652-0_16.
Xavier Bonnetain and André Schrottenloher.
Quantum security analysis of CSIDH.
In Anne Canteaut and Yuval Ishai, editors, EUROCRYPT 2020, Part II, volume 12106 of LNCS, 493–522. Springer, Heidelberg, 2020.
https://doi.org/10.1007/978-3-030-45724-2_17.
Fabio Campos, Matthias J. Kannwischer, Michael Meyer, Hiroshi Onuki, and Marc Stöttinger.
Trouble at the CSIDH: protecting CSIDH with dummy-operations against fault injection attacks.
In 2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 57–65. IEEE, 2020.
https://doi.org/10.1109/FDTC51366.2020.00015.
Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes.
CSIDH: an efficient post-quantum commutative group action.
In Thomas Peyrin and Steven Galbraith, editors, ASIACRYPT 2018, Part III, volume 11274 of LNCS, 395–427. Springer, Heidelberg, 2018.
https://doi.org/10.1007/978-3-030-03332-3_15.
Wouter Castryck, Thomas Decru, Marc Houben, and Frederik Vercauteren.
Horizontal racewalking using radical isogenies.
In Shweta Agrawal and Dongdai Lin, editors, ASIACRYPT 2022, Part II, volume 13792 of LNCS, 67–96. Springer, Heidelberg, 2022.
https://doi.org/10.1007/978-3-031-22966-4_3.
Wouter Castryck and Thomas Decru.
CSIDH on the surface.
In Jintai Ding and Jean-Pierre Tillich, editors, Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, 111–129. Springer, Heidelberg, 2020.
https://doi.org/10.1007/978-3-030-44223-1_7.
Wouter Castryck and Thomas Decru.
An efficient key recovery attack on SIDH.
In Carmit Hazay and Martijn Stam, editors, EUROCRYPT 2023, Part V, volume 14008 of LNCS, 423–447. Springer, Heidelberg, 2023.
https://doi.org/10.1007/978-3-031-30589-4_15.
Wouter Castryck, Thomas Decru, and Frederik Vercauteren.
Radical isogenies.
In Shiho Moriai and Huaxiong Wang, editors, ASIACRYPT 2020, Part II, volume 12492 of LNCS, 493–519. Springer, Heidelberg, 2020.
https://doi.org/10.1007/978-3-030-64834-3_17.
Daniel Cervantes-Vázquez, Mathilde Chenu, Jesús-Javier Chi-Domínguez, Luca De Feo, Francisco Rodríguez-Henríquez, and Benjamin Smith.
Stronger and faster side-channel protections for CSIDH.
In Peter Schwabe and Nicolas Thériault, editors, LATINCRYPT 2019, volume 11774 of LNCS, 173–193. Springer, Heidelberg, 2019.
https://doi.org/10.1007/978-3-030-30530-7_9.
Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Samuel Jaques, and Francisco Rodríguez-Henríquez.
Journal of cryptographic engineering.
Journal of Cryptographic Engineering, 12(3):349–368, 2022.
https://doi.org/10.1007/s13389-021-00271-w.
Craig Costello, Patrick Longa, and Michael Naehrig.
Efficient algorithms for supersingular isogeny Diffie-Hellman.
In Matthew Robshaw and Jonathan Katz, editors, CRYPTO 2016, Part I, volume 9814 of LNCS, 572–601. Springer, Heidelberg, 2016.
https://doi.org/10.1007/978-3-662-53018-4_21.
Craig Costello, David Jao, Patrick Longa, Michael Naehrig, Joost Renes, and David Urbanik.
Efficient compression of SIDH public keys.
In Jean-Sébastien Coron and Jesper Buus Nielsen, editors, EUROCRYPT 2017, Part I, volume 10210 of LNCS, 679–706. Springer, Heidelberg, 2017.
https://doi.org/10.1007/978-3-319-56620-7_24.
Jesús-Javier Chi-Domínguez and Krijn Reijnders.
Fully projective radical isogenies in constant-time.
In Steven D. Galbraith, editor, CT-RSA 2022, volume 13161 of LNCS, 73–95. Springer, Heidelberg, 2022.
https://doi.org/10.1007/978-3-030-95312-6_4.
Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez.
Optimal strategies for CSIDH.
Adv. Math. Commun., 16(2):383–411, 2022.
https://doi.org/10.3934/amc.2020116.
Javad Doliskani.
On division polynomial pit and supersingularity.
Applicable Algebra in Engineering, Communication and Computing, 29(5):393–407, 2018.
https://doi.org/10.1007/S00200-018-0349-Z.
Phillip Gajland, Bor de Kock, Miguel Quaresma, Giulio Malavolta, and Peter Schwabe.
Swoosh: practical lattice-based non-interactive key exchange.
In Proceedings of the 33rd USENIX Security Symposium, to appear. USENIX Association, 2024.
Steven D. Galbraith, Christophe Petit, Barak Shani, and Yan Bo Ti.
On the security of supersingular isogeny cryptosystems.
In Jung Hee Cheon and Tsuyoshi Takagi, editors, ASIACRYPT 2016, Part I, volume 10031 of LNCS, 63–91. Springer, Heidelberg, 2016.
https://doi.org/10.1007/978-3-662-53887-6_3.
Aaron Hutchinson, Jason T. LeGrow, Brian Koziel, and Reza Azarderakhsh.
Further optimizations of CSIDH: A systematic approach to efficient strategies, permutations, and bound vectors.
In Mauro Conti, Jianying Zhou, Emiliano Casalicchio, and Angelo Spognardi, editors, ACNS 20, Part I, volume 12146 of LNCS, 481–501. Springer, Heidelberg, 2020.
https://doi.org/10.1007/978-3-030-57808-4_24.
David Jao and Luca De Feo.
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies.
In Bo-Yin Yang, editor, Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, 19–34. Springer, Heidelberg, 2011.
https://doi.org/10.1007/978-3-642-25405-5_2.
Greg Kuperberg.
Another subexponential-time quantum algorithm for the dihedral hidden subgroup problem.
In Simone Severini and Fernando G. S. L. Brandão, editors, 8th Conference on the Theory of Quantum Computation, Communication and Cryptography, volume 22 of LIPIcs 22, 20–34. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2013.
https://doi.org/10.4230/LIPIcs.TQC.2013.20.
Hugo Krawczyk and Hoeteck Wee.
The OPTLS protocol and TLS 1.3.
In 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 81–96. IEEE, 2016.
https://doi.org/10.1109/EuroSP.2016.18.
Younho Lee, Il-Hee Kim, and Yongsu Park.
Improved multi-precision squaring for low-end RISC microcontrollers.
J. Syst. Softw., 86(1):60–71, 2013.
https://doi.org/10.1016/j.jss.2012.06.074.
Luciano Maino, Chloe Martindale, Lorenz Panny, Giacomo Pope, and Benjamin Wesolowski.
A direct key recovery attack on SIDH.
In Carmit Hazay and Martijn Stam, editors, EUROCRYPT 2023, Part V, volume 14008 of LNCS, 448–471. Springer, Heidelberg, 2023.
https://doi.org/10.1007/978-3-031-30589-4_16.
Michael Meyer, Fabio Campos, and Steffen Reith.
On lions and elligators: an efficient constant-time implementation of CSIDH.
In Jintai Ding and Rainer Steinwandt, editors, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, 307–325. Springer, Heidelberg, 2019.
https://doi.org/10.1007/978-3-030-25510-7_17.
Tomoki Moriya, Hiroshi Onuki, and Tsuyoshi Takagi.
How to construct CSIDH on Edwards curves.
In Stanislaw Jarecki, editor, CT-RSA 2020, volume 12006 of LNCS, 512–537. Springer, Heidelberg, 2020.
https://doi.org/10.1007/978-3-030-40186-3_22.
Michael Meyer and Steffen Reith.
A faster way to the CSIDH.
In Debrup Chakraborty and Tetsu Iwata, editors, INDOCRYPT 2018, volume 11356 of LNCS, 137–152. Springer, Heidelberg, 2018.
https://doi.org/10.1007/978-3-030-05378-9_8.
Chris Peikert.
He gives C-sieves on the CSIDH.
In Anne Canteaut and Yuval Ishai, editors, EUROCRYPT 2020, Part II, volume 12106 of LNCS, 463–492. Springer, Heidelberg, 2020.
https://doi.org/10.1007/978-3-030-45724-2_16.
Thomas Prest, Pierre-Alain Fouque, Jeffrey Hoffstein, Paul Kirchner, Vadim Lyubashevsky, Thomas Pornin, Thomas Ricosset, Gregor Seiler, William Whyte, and Zhenfei Zhang.
FALCON.
2022.
Peter Schwabe, Douglas Stebila, and Thom Wiggers.
Post-quantum TLS without handshake signatures.
In Jay Ligatti, Xinming Ou, Jonathan Katz, and Giovanni Vigna, editors, ACM CCS 2020, 1461–1480. ACM Press, 2020.
https://doi.org/10.1145/3372297.3423350.
Peter Schwabe, Douglas Stebila, and Thom Wiggers.
More efficient post-quantum KEMTLS with pre-distributed public keys.
In Elisa Bertino, Haya Shulman, and Michael Waidner, editors, ESORICS 2021, Part I, volume 12972 of LNCS, 3–22. Springer, Heidelberg, 2021.
https://doi.org/10.1007/978-3-030-88418-5_1.
Paul C. van Oorschot and Michael J. Wiener.
Parallel collision search with cryptanalytic applications.
Journal of Cryptology, 12(1):1–28, 1999.
https://doi.org/10.1007/PL00003816.
@article{10.62056/anjbksdja,
author={Fabio Campos and Jorge Chávez-Saab and Jesús-Javier Chi-Domínguez and Michael Meyer and Krijn Reijnders and Francisco Rodríguez-Henríquez and Peter Schwabe and Thom Wiggers},
title={Optimizations and Practicality of High-Security {CSIDH}},
volume={1},
number={1},
year={2024},
date={2024-04-09},
issn={3006-5496},
doi={10.62056/anjbksdja},
journal={{IACR} Communications in Cryptology},
publisher={International Association for Cryptologic Research}
}
TY - JOUR
AU - Fabio Campos
AU - Jorge Chávez-Saab
AU - Jesús-Javier Chi-Domínguez
AU - Michael Meyer
AU - Krijn Reijnders
AU - Francisco Rodríguez-Henríquez
AU - Peter Schwabe
AU - Thom Wiggers
PY - 2024
TI - Optimizations and Practicality of High-Security CSIDH
JF - IACR Communications in Cryptology
JA - CIC
VL - 1
IS - 1
DO - 10.62056/anjbksdja
UR - https://doi.org/10.62056/anjbksdja
AB - <p> In this work, we assess the real-world practicality of CSIDH, an isogeny-based non-interactive key exchange. We provide the first thorough assessment of the practicality of CSIDH in higher parameter sizes for conservative estimates of quantum security, and with protection against physical attacks.</p><p> This requires a three-fold analysis of CSIDH. First, we describe two approaches to efficient high-security CSIDH implementations, based on SQALE and CTIDH. Second, we optimize such high-security implementations, on a high level by improving several subroutines, and on a low level by improving the finite field arithmetic. Third, we benchmark the performance of high-security CSIDH. As a stand-alone primitive, our implementations outperform previous results by a factor up to 2.53×.</p><p> As a real-world use case considering network protocols, we use CSIDH in TLS variants that allow early authentication through a NIKE. Although our instantiations of CSIDH have smaller communication requirements than post-quantum KEM and signature schemes, even our highly-optimized implementations result in too-large handshake latency (tens of seconds), showing that CSIDH is only practical in niche cases. </p>
ER -
Fabio Campos, Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Michael Meyer, Krijn Reijnders, Francisco Rodríguez-Henríquez, Peter Schwabe, and
Thom Wiggers, Optimizations and Practicality of High-Security CSIDH. IACR Communications in Cryptology, vol. 1, no. 1, Apr 09, 2024, doi: 10.62056/anjbksdja.
Known citations
We do not crawl the web, so we are only able to identify
citations from papers that are registered with a DOI in
crossref.org and the publisher reports their citations to
crossref, and crossref can identify a DOI from the
reference. That includes (most) articles from Springer and
many from ACM, but it excludes citations from USENIX because
they don't issue DOIs. It also excludes citations from arxiv
and eprint. You may find more citations in
Google Scholar.
Maria Santos, Jonathan Eriksen, Michael Meyer and Francisco Rodríguez-Henríquez. Finding Practical Parameters for Isogeny-based Cryptography. IACR Communications in Cryptology (2024) DOI: 10.62056/ayojbhey6b
Tinghung Chiu, Jason LeGrow and Wenjie Xiong. Practical Fault Injection Attacks on Constant Time CSIDH and Mitigation Techniques. Proceedings of the 2024 Workshop on Attacks and Solutions in Hardware Security (2024), p. 11 DOI: 10.1145/3689939.3695789