Abstract
Recently, Daghigh et al. proposed some isogeny-based key agreement protocols in Bull. Iran. Math. Soc. 43 (2017), no. 4, 77-88. They claimed that their key exchange protocols based on supersingular isogenies provide the same security level as the Jao et al.’s protocol SIDH. This paper addresses first a vulnerability of these protocols to a key manipulation attack. Hence, unlike the security claims of Daghigh et al., these protocols unfortunately do not provide the same security when compared with SIDH. Second, we show in particular that the secret dual isogenies of the protocols can easily be retrieved by applying our key manipulation attack. We also discuss lastly the countermeasures to this attack.
Zitieren
1.
Gönen ME, Tutdere S, Uzunkol O. A Key Manipulation Attack on Some Recent Isogeny-Based Key Agreement Protocols. Bulletin of the Iranian Mathematical Society . 2021. doi:10.1007/s41980-021-00534-6.
Gönen, M. E., Tutdere, S. ., & Uzunkol, O. . (2021). A Key Manipulation Attack on Some Recent Isogeny-Based Key Agreement Protocols. Bulletin of the Iranian Mathematical Society . http://doi.org/10.1007/s41980-021-00534-6
Gönen, Mehmet Emin, Seher Tutdere, und Osmanbey Uzunkol. 2021. „A Key Manipulation Attack on Some Recent Isogeny-Based Key Agreement Protocols“. Bulletin of the Iranian Mathematical Society . doi:10.1007/s41980-021-00534-6.
Gönen, Mehmet Emin, Seher Tutdere, und Osmanbey Uzunkol. „A Key Manipulation Attack on Some Recent Isogeny-Based Key Agreement Protocols“. Bulletin of the Iranian Mathematical Society (2021): n. pag.
Gönen, Mehmet Emin, u. a. „A Key Manipulation Attack on Some Recent Isogeny-Based Key Agreement Protocols“. Bulletin of the Iranian Mathematical Society , 2021, doi:10.1007/s41980-021-00534-6.
Details
-
Date Published
2021/02/27 -
ISBN Number
1735-8515 -
URL
https://doi.org/10.1007/s41980-021-00534-6