POST-QUANTUM KEY-EXCHANGE USING SUPERSINGULAR ISOGENY
<p align="justify">Cryptography is the practice and study of techniques to secure an information from unwanted third parties. Most of the modern cryptography that is applied today is heavily based on mathematical theory, which is the integer factorization problem, the discrete logari...
Saved in:
Main Author: | |
---|---|
Format: | Final Project |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/29271 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Summary: | <p align="justify">Cryptography is the practice and study of techniques to secure an information from unwanted third parties. Most of the modern cryptography that is applied today is heavily based on mathematical theory, which is the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. One of the favorite cryptography is Elliptic Curve Cryptography (ECC) because its cheapness on storing data. But since shor’s algorithm that runs on quantum computer could break these mathematics problem, in 2015 NSA announces plans to change their suite-B to quantum-resistant algorithms. One of the well-known post-quantum cryptography primitives is Supersingular Isogeny that proposed by Jao and De Feo in 2011 (SIDH). <br />
<br />
<br />
<br />
In this research we will explain how to generate the public parameters for SIDH and an efficient algorithm to compute isogeny without weight data. We will also try to prove why two curve generated from SIDH algorithm is isomorph. <br />
<br />
<br />
<br />
We will provide various algorithms to perform operations on the elements of the field Fp^2 with p ≡ 3 mod 4, operations on elliptic curve group and algorithm for SIDH scheme in python. <p align="justify"> <br />
|
---|