On the supersingular GPST attack (Q2239798)
From MaRDI portal
![]() | This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: On the supersingular GPST attack |
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | On the supersingular GPST attack |
scientific article |
Statements
On the supersingular GPST attack (English)
0 references
5 November 2021
0 references
Galbraith Petit-Shani-Ti (GPST) attack is an active attack against the supersingular isogeny-based cryptosystem, also known as,the supersingular isogeny Diffie-Hellman (SIDH). The attack allows an attacker who interacts with a static key over multiple rounds of SIDH key exchange and in this correspondence, the attacker can find one bit of information about the other participant's private key and hence can find the full secret key by repeating the process. The GPST attack is known for its important role in security. In this article, the authors investigate some specific conditions that show the attack fails to recover the secret key. In order to illustrate this, they present an example where the GPST attack fails to recover the private key of a SIDH key exchange.
0 references
isogenies
0 references
supersingular elliptic curves
0 references
modular invariants
0 references