International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Optimizations and Practicality of High-Security CSIDH

Authors:
Fabio Campos , RheinMain University of Applied Sciences
Jorge Chávez-Saab , Cryptography Research Center, Technology Innovation Institute
Jesús-Javier Chi-Domínguez , Cryptography Research Center, Technology Innovation Institute
Michael Meyer , University of Regensburg
Krijn Reijnders , Radboud University
Francisco Rodríguez-Henríquez , Cryptography Research Center, Technology Innovation Institute
Peter Schwabe , Max Planck Institute for Security and Privacy, Radboud University
Thom Wiggers , PQShield
Download:
DOI: 10.62056/anjbksdja
URL: https://cic.iacr.org//p/1/1/5
Search ePrint
Search Google
Abstract:

In this work, we assess the real-world practicality of CSIDH, an isogeny-based non-interactive key exchange. We provide the first thorough assessment of the practicality of CSIDH in higher parameter sizes for conservative estimates of quantum security, and with protection against physical attacks.

This requires a three-fold analysis of CSIDH. First, we describe two approaches to efficient high-security CSIDH implementations, based on SQALE and CTIDH. Second, we optimize such high-security implementations, on a high level by improving several subroutines, and on a low level by improving the finite field arithmetic. Third, we benchmark the performance of high-security CSIDH. As a stand-alone primitive, our implementations outperform previous results by a factor up to 2.53×.

As a real-world use case considering network protocols, we use CSIDH in TLS variants that allow early authentication through a NIKE. Although our instantiations of CSIDH have smaller communication requirements than post-quantum KEM and signature schemes, even our highly-optimized implementations result in too-large handshake latency (tens of seconds), showing that CSIDH is only practical in niche cases.

BibTeX
@article{cic-2024-34128,
  title={Optimizations and Practicality of High-Security CSIDH},
  journal={cic},
  publisher={International Association for Cryptologic Research},
  volume={1, Issue 1},
  url={https://cic.iacr.org//p/1/1/5},
  doi={10.62056/anjbksdja},
  author={Fabio Campos and Jorge Chávez-Saab and Jesús-Javier Chi-Domínguez and Michael Meyer and Krijn Reijnders and Francisco Rodríguez-Henríquez and Peter Schwabe and Thom Wiggers},
  year=2024
}