SlideShare a Scribd company logo
Abstract
The public-key cryptosystems currently in use today like RSA and Elliptic Curve Cryptography (ECC)
are said to be threatened by the use of quantum computers in the near future. In an effort to
address this issue, many post quantum cryptosystems have been developed over the years like the
supersingular isogeny based cryptography invented by De Feo, Jao, and Plût (2014). However, as for
any recently developed cryptosystem, its efficiency is not yet well understood and not fully analysed.
We propose to investigate the efficiency of the supersingular isogeny based cryptosystem and
determine which factors may have an impact on the efficiency of the system.
For this purpose, we first examine the previous efforts made to investigate and improve the
efficiency of this system. Then, we identify a gap consisting in the parameters generation phase of
the Supersingular Isogeny Diffie–Hellman key exchange protocol (SIDH) for which the efficiency is
not yet investigated. Afterwards, we determine that the component responsible for most of the
execution time within that phase is the supersingular curve construction. A novel approach along
with experiments to investigate the efficiency of that component are then proposed and the results
of the experiments are recorded and analysed.
These results enable the formulation of several hypotheses about the factors that might influence
the efficiency of the system. Drawing from these hypotheses, we finally give suggestions about the
efficiency of the supersingular Isogeny based Cryptosystem.
The main contributions of our research are: a theoretical result as for choosing the input prime 𝑝 of
the supersingular isogeny based protocol. Primes satisfying certain conditions are suspected to
improve the performance of the supersingular curve construction and hence the performance of the
entire protocol. Also, we give the complete implementation of the Supersingular curve construction
algorithm in C with multiple precision integer support using the library GMP.
Our research is considered a step forward in investigating the efficiency of one of the postquantum
cryptosystem candidates for replacing the current public-key cryptosystems in use today. This
investigation could be used in future research to improve the efficiency of this system and to
compare between the efficiency of the different postquantum cryptosystems in development. Such
comparison would help researchers in the field choose the most practical cryptosystem to be used in
the real world in the future against quantum computers. One such cryptosystem would allow
computers’ users to protect their data and communications on the internet against quantum attacks
able to violate users’ data confidentiality and integrity.

More Related Content

Similar to Abstract

Data Structures in the Multicore Age : Notes
Data Structures in the Multicore Age : NotesData Structures in the Multicore Age : Notes
Data Structures in the Multicore Age : Notes
Subhajit Sahu
 
Data mining projects topics for java and dot net
Data mining projects topics for java and dot netData mining projects topics for java and dot net
Data mining projects topics for java and dot net
redpel dot com
 
rooter.pdf
rooter.pdfrooter.pdf
rooter.pdf
HungryBastard
 
Model checking
Model checkingModel checking
Model checking
Richard Ashworth
 
Final Year Project Synopsis: Post Quantum Encryption using Neural Networks
Final Year Project Synopsis: Post Quantum Encryption using Neural NetworksFinal Year Project Synopsis: Post Quantum Encryption using Neural Networks
Final Year Project Synopsis: Post Quantum Encryption using Neural Networks
JPC Hanson
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
Vijay Karan
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
Vijay Karan
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
Vijay Karan
 
M.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing ProjectsM.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing Projects
Vijay Karan
 
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
VLSICS Design
 
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
VLSICS Design
 
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
VLSICS Design
 
M.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing ProjectsM.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing Projects
Vijay Karan
 
Genetic Algorithm for task scheduling in Cloud Computing Environment
Genetic Algorithm for task scheduling in Cloud Computing EnvironmentGenetic Algorithm for task scheduling in Cloud Computing Environment
Genetic Algorithm for task scheduling in Cloud Computing Environment
Swapnil Shahade
 
Comparing Write-Ahead Logging and the Memory Bus Using
Comparing Write-Ahead Logging and the Memory Bus UsingComparing Write-Ahead Logging and the Memory Bus Using
Comparing Write-Ahead Logging and the Memory Bus Using
jorgerodriguessimao
 
Enabling Congestion Control Using Homogeneous Archetypes
Enabling Congestion Control Using Homogeneous ArchetypesEnabling Congestion Control Using Homogeneous Archetypes
Enabling Congestion Control Using Homogeneous Archetypes
James Johnson
 
Producer consumer-problems
Producer consumer-problemsProducer consumer-problems
Producer consumer-problems
Richard Ashworth
 
Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016
ijcsbi
 
Top Cited Articles International Journal of Computer Science, Engineering and...
Top Cited Articles International Journal of Computer Science, Engineering and...Top Cited Articles International Journal of Computer Science, Engineering and...
Top Cited Articles International Journal of Computer Science, Engineering and...
IJCSEA Journal
 

Similar to Abstract (20)

Data Structures in the Multicore Age : Notes
Data Structures in the Multicore Age : NotesData Structures in the Multicore Age : Notes
Data Structures in the Multicore Age : Notes
 
Data mining projects topics for java and dot net
Data mining projects topics for java and dot netData mining projects topics for java and dot net
Data mining projects topics for java and dot net
 
rooter.pdf
rooter.pdfrooter.pdf
rooter.pdf
 
Model checking
Model checkingModel checking
Model checking
 
Final Year Project Synopsis: Post Quantum Encryption using Neural Networks
Final Year Project Synopsis: Post Quantum Encryption using Neural NetworksFinal Year Project Synopsis: Post Quantum Encryption using Neural Networks
Final Year Project Synopsis: Post Quantum Encryption using Neural Networks
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
 
M.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing ProjectsM.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing Projects
 
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
 
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
 
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
COVERAGE DRIVEN FUNCTIONAL TESTING ARCHITECTURE FOR PROTOTYPING SYSTEM USING ...
 
M.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing ProjectsM.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing Projects
 
Genetic Algorithm for task scheduling in Cloud Computing Environment
Genetic Algorithm for task scheduling in Cloud Computing EnvironmentGenetic Algorithm for task scheduling in Cloud Computing Environment
Genetic Algorithm for task scheduling in Cloud Computing Environment
 
Comparing Write-Ahead Logging and the Memory Bus Using
Comparing Write-Ahead Logging and the Memory Bus UsingComparing Write-Ahead Logging and the Memory Bus Using
Comparing Write-Ahead Logging and the Memory Bus Using
 
Enabling Congestion Control Using Homogeneous Archetypes
Enabling Congestion Control Using Homogeneous ArchetypesEnabling Congestion Control Using Homogeneous Archetypes
Enabling Congestion Control Using Homogeneous Archetypes
 
Producer consumer-problems
Producer consumer-problemsProducer consumer-problems
Producer consumer-problems
 
Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016Vol 16 No 2 - July-December 2016
Vol 16 No 2 - July-December 2016
 
Top Cited Articles International Journal of Computer Science, Engineering and...
Top Cited Articles International Journal of Computer Science, Engineering and...Top Cited Articles International Journal of Computer Science, Engineering and...
Top Cited Articles International Journal of Computer Science, Engineering and...
 

Abstract

  • 1. Abstract The public-key cryptosystems currently in use today like RSA and Elliptic Curve Cryptography (ECC) are said to be threatened by the use of quantum computers in the near future. In an effort to address this issue, many post quantum cryptosystems have been developed over the years like the supersingular isogeny based cryptography invented by De Feo, Jao, and Plût (2014). However, as for any recently developed cryptosystem, its efficiency is not yet well understood and not fully analysed. We propose to investigate the efficiency of the supersingular isogeny based cryptosystem and determine which factors may have an impact on the efficiency of the system. For this purpose, we first examine the previous efforts made to investigate and improve the efficiency of this system. Then, we identify a gap consisting in the parameters generation phase of the Supersingular Isogeny Diffie–Hellman key exchange protocol (SIDH) for which the efficiency is not yet investigated. Afterwards, we determine that the component responsible for most of the execution time within that phase is the supersingular curve construction. A novel approach along with experiments to investigate the efficiency of that component are then proposed and the results of the experiments are recorded and analysed. These results enable the formulation of several hypotheses about the factors that might influence the efficiency of the system. Drawing from these hypotheses, we finally give suggestions about the efficiency of the supersingular Isogeny based Cryptosystem. The main contributions of our research are: a theoretical result as for choosing the input prime 𝑝 of the supersingular isogeny based protocol. Primes satisfying certain conditions are suspected to improve the performance of the supersingular curve construction and hence the performance of the entire protocol. Also, we give the complete implementation of the Supersingular curve construction algorithm in C with multiple precision integer support using the library GMP. Our research is considered a step forward in investigating the efficiency of one of the postquantum cryptosystem candidates for replacing the current public-key cryptosystems in use today. This investigation could be used in future research to improve the efficiency of this system and to compare between the efficiency of the different postquantum cryptosystems in development. Such comparison would help researchers in the field choose the most practical cryptosystem to be used in the real world in the future against quantum computers. One such cryptosystem would allow computers’ users to protect their data and communications on the internet against quantum attacks able to violate users’ data confidentiality and integrity.