Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

On the Performance Analysis for CSIDH-Based Cryptosystems

Full metadata record
DC Field Value Language
dc.contributor.authorHeo, Donghoe-
dc.contributor.authorKim, Suhri-
dc.contributor.authorPark, Young-Ho-
dc.contributor.authorHong, Seokhie-
dc.date.accessioned2021-08-30T13:50:13Z-
dc.date.available2021-08-30T13:50:13Z-
dc.date.created2021-06-18-
dc.date.issued2020-10-
dc.identifier.issn2076-3417-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/53029-
dc.description.abstractIn this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange algorithms have been proposed to optimize the CSIDH. In CSIDH, the private key is an ideal class in a class group, which can be represented by an integer vector. As the number of ideal classes represented by these vectors determines the security level of CSIDH, it is important to analyze whether the different vectors induce the same public key. In this regard, we generalize the existence of a collision for a base prime p equivalent to 7mod8. Based on our result, we present a new interval for the private key to have a similar security level for the various CSIDH-based algorithms for a fair comparison of the performance. Deduced from the implementation result, we conclude that for a prime p equivalent to 7mod8, CSIDH on the surface using the Montgomery curves is the most likely to be efficient. For a prime p equivalent to 3mod8, CSIDH on the floor using the hybrid method with Onuki's collision-free method is the most likely to be efficient and secure.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherMDPI-
dc.titleOn the Performance Analysis for CSIDH-Based Cryptosystems-
dc.typeArticle-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.identifier.doi10.3390/app10196927-
dc.identifier.scopusid2-s2.0-85092774001-
dc.identifier.wosid000586383900001-
dc.identifier.bibliographicCitationAPPLIED SCIENCES-BASEL, v.10, no.19-
dc.relation.isPartOfAPPLIED SCIENCES-BASEL-
dc.citation.titleAPPLIED SCIENCES-BASEL-
dc.citation.volume10-
dc.citation.number19-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaChemistry-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaMaterials Science-
dc.relation.journalResearchAreaPhysics-
dc.relation.journalWebOfScienceCategoryChemistry, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryEngineering, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryMaterials Science, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryPhysics, Applied-
dc.subject.keywordAuthorpost-quantum cryptography-
dc.subject.keywordAuthorisogeny-
dc.subject.keywordAuthorMontgomery curves-
dc.subject.keywordAuthorCSIDH-
dc.subject.keywordAuthorCSURF-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE