Advanced search
1 file | 617.16 KB Add to list

Hash functions from superspecial genus-2 curves using Richelot isogenies

Author
Organization
Abstract
Last year Takashima proposed a version of Charles, Goren and Lauter's hash function using Richelot isogenies, starting from a genus-2 curve that allows for all subsequent arithmetic to be performed over a quadratic finite field Fp2. In a very recent paper Flynn and Ti point out that Takashima's hash function is insecure due to the existence of small isogeny cycles. We revisit the construction and show that it can be repaired by imposing a simple restriction, which moreover clarifies the security analysis. The runtime of the resulting hash function is dominated by the extraction of 3 square roots for every block of 3 bits of the message, as compared to one square root per bit in the elliptic curve case; however in our setting the extractions can be parallelized and are done in a finite field whose bit size is reduced by a factor 3. Along the way we argue that the full supersingular isogeny graph is the wrong context in which to study higher-dimensional analogues of Charles, Goren and Lauter's hash function, and advocate the use of the superspecial subgraph, which is the natural framework in which to view Takashima's Fp2-friendly starting curve.

Downloads

  • (...).pdf
    • full text (Accepted manuscript)
    • |
    • UGent only
    • |
    • PDF
    • |
    • 617.16 KB

Citation

Please use this url to cite or link to this publication:

MLA
Castryck, Wouter, et al. “Hash Functions from Superspecial Genus-2 Curves Using Richelot Isogenies.” JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020.
APA
Castryck, W., Decru, T., & Smith, B. (2020). Hash functions from superspecial genus-2 curves using Richelot isogenies. JOURNAL OF MATHEMATICAL CRYPTOLOGY.
Chicago author-date
Castryck, Wouter, Thomas Decru, and Benjamin Smith. 2020. “Hash Functions from Superspecial Genus-2 Curves Using Richelot Isogenies.” JOURNAL OF MATHEMATICAL CRYPTOLOGY.
Chicago author-date (all authors)
Castryck, Wouter, Thomas Decru, and Benjamin Smith. 2020. “Hash Functions from Superspecial Genus-2 Curves Using Richelot Isogenies.” JOURNAL OF MATHEMATICAL CRYPTOLOGY.
Vancouver
1.
Castryck W, Decru T, Smith B. Hash functions from superspecial genus-2 curves using Richelot isogenies. JOURNAL OF MATHEMATICAL CRYPTOLOGY. 2020;
IEEE
[1]
W. Castryck, T. Decru, and B. Smith, “Hash functions from superspecial genus-2 curves using Richelot isogenies,” JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020.
@article{8665519,
  abstract     = {Last year Takashima proposed a version of Charles, Goren and Lauter's hash function using Richelot isogenies, starting from a genus-2 curve that allows for all subsequent arithmetic to be performed over a quadratic finite field Fp2. In a very recent paper Flynn and Ti point out that Takashima's hash function is insecure due to the existence of small isogeny cycles. We revisit the construction and show that it can be repaired by imposing a simple restriction, which moreover clarifies the security analysis. The runtime of the resulting hash function is dominated by the extraction of 3 square roots for every block of 3 bits of the message, as compared to one square root per bit in the elliptic curve case; however in our setting the extractions can be parallelized and are done in a finite field whose bit size is reduced by a factor 3. Along the way we argue that the full supersingular isogeny graph is the wrong context in which to study higher-dimensional analogues of Charles, Goren and Lauter's hash function, and advocate the use of the superspecial subgraph, which is the natural framework in which to view Takashima's Fp2-friendly starting curve.},
  author       = {Castryck, Wouter and Decru, Thomas and Smith, Benjamin},
  issn         = {1862-2976},
  journal      = {JOURNAL OF MATHEMATICAL CRYPTOLOGY},
  language     = {eng},
  title        = {Hash functions from superspecial genus-2 curves using Richelot isogenies},
  year         = {2020},
}