A key manipulation attack on some recent isogeny-based key agreement protocols
| dc.authorid | 0000-0003-1371-171X | en_US |
| dc.authorid | 0000-0001-5645-8174 | en_US |
| dc.contributor.author | Gönen, Mehmet Emin | |
| dc.contributor.author | Tutdere, Seher | |
| dc.contributor.author | Uzunkol, Osmanbey | |
| dc.date.accessioned | 2022-06-23T11:27:03Z | |
| dc.date.available | 2022-06-23T11:27:03Z | |
| dc.date.issued | 2021 | en_US |
| dc.department | Fakülteler, Fen-Edebiyat Fakültesi, Matematik Bölümü | en_US |
| dc.description | Tutdere, Seher (Balikesir Author) | en_US |
| dc.description.abstract | Recently, Daghigh et al. proposed some isogeny-based key agreement protocols in Bull. Iran. Math. Soc. 43 (2017), no. 4, 77-88. They claimed that their key exchange protocols based on supersingular isogenies provide the same security level as the Jao et al.’s protocol SIDH. This paper addresses first a vulnerability of these protocols to a key manipulation attack. Hence, unlike the security claims of Daghigh et al., these protocols unfortunately do not provide the same security when compared with SIDH. Second, we show in particular that the secret dual isogenies of the protocols can easily be retrieved by applying our key manipulation attack. We also discuss lastly the countermeasures to this attack. | en_US |
| dc.identifier.doi | 10.1007/s41980-021-00534-6 | |
| dc.identifier.endpage | 625 | en_US |
| dc.identifier.issn | 1017-060X | |
| dc.identifier.issn | 1735-8515 | |
| dc.identifier.issue | 2 | en_US |
| dc.identifier.scopus | 2-s2.0-85101702660 | |
| dc.identifier.scopusquality | Q2 | |
| dc.identifier.startpage | 613 | en_US |
| dc.identifier.uri | https://doi.org/10.1007/s41980-021-00534-6 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.12462/12355 | |
| dc.identifier.volume | 48 | en_US |
| dc.identifier.wos | WOS:000622670400002 | |
| dc.identifier.wosquality | Q3 | |
| dc.indekslendigikaynak | Web of Science | |
| dc.indekslendigikaynak | Scopus | |
| dc.language.iso | en | en_US |
| dc.publisher | Springer Singapore Pte Ltd | en_US |
| dc.relation.ispartof | Bulletin of the Iranian Mathematical Society | en_US |
| dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
| dc.rights | info:eu-repo/semantics/embargoedAccess | en_US |
| dc.subject | Isogeny | en_US |
| dc.subject | Key Agreement Protocols | en_US |
| dc.subject | Key Manipulation | en_US |
| dc.subject | Supersingular Elliptic Curves | en_US |
| dc.subject | Post-Quantum | en_US |
| dc.subject | Attack | en_US |
| dc.title | A key manipulation attack on some recent isogeny-based key agreement protocols | en_US |
| dc.type | Article | en_US |












