/* ---- Google Analytics Code Below */

Thursday, August 04, 2022

Encryption Contender Cracked by Simpler Methods

 Good to see this was detected early.  Without Quantum Methods.  Why was it so susceptible? Implications for future methods?   (This was later explained to some degree, with further comments in Schneier:   https://www.schneier.com/blog/archives/2022/08/sike-broken.html#comments


Post-Quantum Encryption Contender Taken Out by Single-Core PC in One Hour

By Ars Technica, August 3, 2022

Researchers at Belgium's Katholieke Universiteit Leuven (KU Leuven) ruled out an algorithm selected by the U.S. National Institute of Standards and Technology as a potential post-quantum encryption program.

The Supersingular Isogeny Key Encapsulation (SIKE) algorithm was thought to be quantum-decryption-proof by avoiding key encapsulation's vulnerabilities through a supersingular isogeny graph.

KU Leuven researchers used a single classical computer to break SIKE, which took it just one hour.

The team showed SIKE's linchpin, the Supersingular Isogeny Diffie-Hellman (SIDH) protocol, is vulnerable to a variant of a GPST adaptive attack that "exploits the fact that SIDH has auxiliary points and that the degree of the secret isogeny is known," explained Steven Galbraith at New Zealand's University of Auckland....  ' 

According to the University of Maryland's Jonathan Katz, “The attack is entirely classical, and does not require quantum computers at all.” ...   '  

Full Article

See explanation, comments in Schneierhttps://www.schneier.com/blog/archives/2022/08/sike-broken.html#comments )

No comments: