Complete Analysis of Implementing Isogeny-Based Cryptography Using Huff Form of Elliptic Curves
In this paper, we present the analysis of Huff curves for implementing isogeny-based cryptography. In this regard, we first investigate the computational cost of the building blocks when compression functions are used for Huff curves. We present a new formula for recovering the coefficient of the cu...
Guardado en:
Autor principal: | |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
IEEE
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/f6fdbacc8da341fba95e183ad8656db5 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:f6fdbacc8da341fba95e183ad8656db5 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:f6fdbacc8da341fba95e183ad8656db52021-11-25T00:00:59ZComplete Analysis of Implementing Isogeny-Based Cryptography Using Huff Form of Elliptic Curves2169-353610.1109/ACCESS.2021.3128515https://doaj.org/article/f6fdbacc8da341fba95e183ad8656db52021-01-01T00:00:00Zhttps://ieeexplore.ieee.org/document/9615246/https://doaj.org/toc/2169-3536In this paper, we present the analysis of Huff curves for implementing isogeny-based cryptography. In this regard, we first investigate the computational cost of the building blocks when compression functions are used for Huff curves. We present a new formula for recovering the coefficient of the curve, from a given point on a Huff curve, which is essential for implementing SIDH. We also apply the square-root Vélu formula on Huff curves and further optimize Huff-CSIDH by exploiting Edwards curves for computing the coefficient of the image curve and present the Huff-Edwards hybrid model. From our implementation, the performance of Huff-SIDH and Montgomery-SIDH is almost the same, and the performance of Huff-CSIDH is 6% faster than Montgomery-CSIDH. The performance of Huff-Edwards CSIDH is almost the same as Montgomery-Edwards CSIDH. The result of our work shows that Huff curves can be quite practical for implementing isogeny-based cryptography but has some limitations.Suhri KimIEEEarticlePost-quantum cryptographyisogeny-based cryptographyHuff curvesElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENIEEE Access, Vol 9, Pp 154500-154512 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Post-quantum cryptography isogeny-based cryptography Huff curves Electrical engineering. Electronics. Nuclear engineering TK1-9971 |
spellingShingle |
Post-quantum cryptography isogeny-based cryptography Huff curves Electrical engineering. Electronics. Nuclear engineering TK1-9971 Suhri Kim Complete Analysis of Implementing Isogeny-Based Cryptography Using Huff Form of Elliptic Curves |
description |
In this paper, we present the analysis of Huff curves for implementing isogeny-based cryptography. In this regard, we first investigate the computational cost of the building blocks when compression functions are used for Huff curves. We present a new formula for recovering the coefficient of the curve, from a given point on a Huff curve, which is essential for implementing SIDH. We also apply the square-root Vélu formula on Huff curves and further optimize Huff-CSIDH by exploiting Edwards curves for computing the coefficient of the image curve and present the Huff-Edwards hybrid model. From our implementation, the performance of Huff-SIDH and Montgomery-SIDH is almost the same, and the performance of Huff-CSIDH is 6% faster than Montgomery-CSIDH. The performance of Huff-Edwards CSIDH is almost the same as Montgomery-Edwards CSIDH. The result of our work shows that Huff curves can be quite practical for implementing isogeny-based cryptography but has some limitations. |
format |
article |
author |
Suhri Kim |
author_facet |
Suhri Kim |
author_sort |
Suhri Kim |
title |
Complete Analysis of Implementing Isogeny-Based Cryptography Using Huff Form of Elliptic Curves |
title_short |
Complete Analysis of Implementing Isogeny-Based Cryptography Using Huff Form of Elliptic Curves |
title_full |
Complete Analysis of Implementing Isogeny-Based Cryptography Using Huff Form of Elliptic Curves |
title_fullStr |
Complete Analysis of Implementing Isogeny-Based Cryptography Using Huff Form of Elliptic Curves |
title_full_unstemmed |
Complete Analysis of Implementing Isogeny-Based Cryptography Using Huff Form of Elliptic Curves |
title_sort |
complete analysis of implementing isogeny-based cryptography using huff form of elliptic curves |
publisher |
IEEE |
publishDate |
2021 |
url |
https://doaj.org/article/f6fdbacc8da341fba95e183ad8656db5 |
work_keys_str_mv |
AT suhrikim completeanalysisofimplementingisogenybasedcryptographyusinghuffformofellipticcurves |
_version_ |
1718414731201478656 |