New hybrid method for isogeny-based cryptosystems using edwards curves

Suhri Kim, Kisoon Yoon, Jihoon Kwon, Young Ho Park, Seokhie Hong

Research output: Contribution to journalArticlepeer-review

9 Citations (Scopus)

Abstract

Along with the resistance against quantum computers, isogeny-based cryptography offers attractive cryptosystems due to small key sizes and compatibility with the current elliptic curve primitives. While the state-of-The-Art implementation uses Montgomery curves, which facilitates efficient elliptic curve arithmetic and isogeny computations, other forms of elliptic curves can be used to produce an efficient result. In this paper, we present the new hybrid method for isogeny-based cryptosystem using Edwards curves. Unlike the previous hybrid methods, we exploit Edwards curves for recovering the curve coefficients and Montgomery curves for other operations. To this end, we first carefully examine and compare the computational cost of Montgomery and Edwards isogenies. Then, we fine-Tune and tailor Edwards isogenies in order to blend with Montgomery isogenies efficiently. Additionally, we present the implementation results of Supersingular Isogeny Diffie-Hellman (SIDH) key exchange using the proposed method. We demonstrate that our method outperforms the previously proposed hybrid method, and is as fast as Montgomery-only implementation. Our results show that proper use of Edwards curves for isogeny-based cryptosystem can be quite practical.

Original languageEnglish
Article number8822753
Pages (from-to)1934-1943
Number of pages10
JournalIEEE Transactions on Information Theory
Volume66
Issue number3
DOIs
Publication statusPublished - 2020 Mar

Bibliographical note

Publisher Copyright:
© 1963-2012 IEEE.

Keywords

  • Edwards curves
  • Isogeny
  • SIDH
  • montgomery curves
  • post-quantum cryptography

ASJC Scopus subject areas

  • Information Systems
  • Computer Science Applications
  • Library and Information Sciences

Fingerprint

Dive into the research topics of 'New hybrid method for isogeny-based cryptosystems using edwards curves'. Together they form a unique fingerprint.

Cite this