Sign In

Communications of the ACM

ACM TechNews

Post-Quantum Encryption Contender Taken Out by Single-Core PC in One Hour

View as: Print Mobile App Share:

According to the University of Maryland's Jonathan Katz, “The attack is entirely classical, and does not require quantum computers at all.”

Credit: Getty Images

Researchers at Belgium's Katholieke Universiteit Leuven (KU Leuven) ruled out an algorithm selected by the U.S. National Institute of Standards and Technology as a potential post-quantum encryption program.

The Supersingular Isogeny Key Encapsulation (SIKE) algorithm was thought to be quantum-decryption-proof by avoiding key encapsulation's vulnerabilities through a supersingular isogeny graph.

KU Leuven researchers used a single classical computer to break SIKE, which took it just one hour.

The team showed SIKE's linchpin, the Supersingular Isogeny Diffie-Hellman (SIDH) protocol, is vulnerable to a variant of a GPST adaptive attack that "exploits the fact that SIDH has auxiliary points and that the degree of the secret isogeny is known," explained Steven Galbraith at New Zealand's University of Auckland.

From Ars Technica
View Full Article


Abstracts Copyright © 2022 SmithBucklin, Washington, DC, USA


No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account