2020
DOI: 10.1007/978-3-030-45388-6_18
|View full text |Cite
|
Sign up to set email alerts
|

Improved Classical Cryptanalysis of SIKE in Practice

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…It is believed that the best classical algorithm [7] to attack the problem has the complexity O( 2√ l e l ), where l e l = min(l e 1 1 , l e 2 2 ), while the claw-finding quantum algorithm [21] has the complexity O( 3√ l e l ). Recent research [4,16] show that the actual quantum complexity of breaking the isogeny problem is estimated by O( 4√ p) operations, but we choose to be a little on a safe side.…”
Section: Discussionmentioning
confidence: 99%
“…It is believed that the best classical algorithm [7] to attack the problem has the complexity O( 2√ l e l ), where l e l = min(l e 1 1 , l e 2 2 ), while the claw-finding quantum algorithm [21] has the complexity O( 3√ l e l ). Recent research [4,16] show that the actual quantum complexity of breaking the isogeny problem is estimated by O( 4√ p) operations, but we choose to be a little on a safe side.…”
Section: Discussionmentioning
confidence: 99%
“…In the next step, we extrapolate the model function to higher values of n and compare them to the values resulting from evaluating Equation (1) at the respective n-values. The results are visualized in Figure 2.…”
Section: Motivating Examplementioning
confidence: 99%
“…The two main ideas behind it are: (1) The enumeration algorithm we already considered demonstrates that the variable in the exponent may grow faster than linearly (quadratic in that case). ( 2) Previous work about the LLL lattice reduction algorithm 19 shows that the practical behavior of programs with polynomial runtime can be accurately modeled by polynomials with a real exponent,although the complexity class  for the underlying algorithm is given by integer exponents.…”
Section: Exponential Polynomial Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, we study quantum algorithms for the golden collision search problem. In the context of the NIST call, these algorithms can be applied in a generic key-recovery of the NIST candidate SIKE (non-commutative supersingular isogeny-based key encapsulation) [20,2,15]. They can also be used in some lattice attacks [3].…”
Section: Introductionmentioning
confidence: 99%