August 14, 2022

The Indie Toaster

Complete News World

The quantum post-crypto competitor is output by a single-core computer for one hour

The quantum post-crypto competitor is output by a single-core computer for one hour

Getty Images

In the US government’s ongoing campaign to protect data in the age of quantum computers, a new and powerful attack that used a single classical computer to completely crack the fourth-round filter highlights the risks involved in standardizing the next generation of cryptographic algorithms.

Last month, the US Department of Commerce’s National Institute of Standards and Technology, or NIST ., was named Four post-quantum computing encryption algorithms To replace algorithms such as RSA, Diffie-Hellman, and Diffie-Hellman elliptic curve, which cannot withstand quantum computer attacks.

In the same step, NIST has developed four additional algorithms as potential alternatives pending further testing in the hope that one or more of them will also be suitable cryptographic alternatives in the post-quantum world. The new attack breaks SIKE, one of the last four additional algorithms. The attack has no effect on the four PQC algorithms chosen by NIST as the approved standards, all of which are based on completely different mathematical techniques than SIKE.

Totally liked

SIKE – short for Super symmetric key encapsulation—He is now likely out of the race thanks to research published by North American researchers over the weekend Computer security and industrial encryption The collection is at KU Leuven. The paper is titled Effective Key Recovery Attack on SIDH (Initial Version), describes a technique that uses complex mathematics and a single traditional computer to retrieve the cryptographic keys that protect SIKE-protected transactions. The whole process takes about an hour.

“It is clear that the recently revealed vulnerability is a huge blow to SIKE,” David Gao, a professor at the University of Waterloo and co-inventor of SIKE, wrote in an email. “The attack is really unexpected.”

See also  Turtle Beach's new wireless headphone does basically everything

The advent of public-key cryptography in the 1970s was a major breakthrough because it allowed parties who had never met to securely trade encrypted material that an adversary could not crack. Public key cryptography is based on asymmetric keys, with one private key used for decrypting messages and a separate public key for encryption. Users make their public key widely available. As long as their private key remains secret, the system remains secure.

In practice, public key cryptography is often impractical, so many systems rely on key-encapsulation mechanisms, which allow parties that have not met before to jointly agree on a symmetric key over a public medium such as the Internet. In contrast to symmetric key algorithms, the key-encapsulation mechanisms in use today can be easily broken by quantum computers. Prior to the new attack, SIKE was believed to circumvent such vulnerabilities by using a complex mathematical structure known as a hypergenomic isogenic graph.

The cornerstone of SIKE is a protocol called SIDH, which is an acronym for Supersingular Isogeny Diffie-Hellman. The research paper published over the weekend shows SIDH’s exposure to a theory known as “glue and cleavage” developed by mathematician Ernst Kanye in 1997, as well as tools devised by fellow mathematicians Everett W. Howe, Frank Leprovost, and Björn Bonnen in 2000. The new technique is based on what is known as an “adaptive GPST attack” described in 2016 paper. The math behind the latest attack is certainly impenetrable to most non-mathematicians. Here’s as close as you can get:

“The attack takes advantage of the fact that SIDH has auxiliary points and that the degree of secret homology is known” Stephen Galbraitha professor of mathematics at the University of Auckland and “G” in adaptive GPST attack, explained in a short writing in the new attack. “SIDH auxiliary points have always been a potential nuisance and vulnerability, and they have been exploited for crash attacks, GPST adaptive attack, warp point attacks, etc.

See also  A hit and run game getting a refresh as a great open-world game

He completed:

Leaves E_0 Have a base curve and allow P_0, Q_0 \ at E_0 you have a request 2 ^ a. Leaves e, q, o It must be given such a presence of symmetry \ phi class 3 ^ b with \phi: E_0\ to E.And the \ phi (P_0) = P.And the \ phi (Q_0) = Q.

A key aspect of SIDH is that one does not count \ phi directly, but as a composition of homogeneous of degree 3. In other words, there is a series of curves E_0 to E_1 to E_2 to cdots to E. Connected to 3-isogenies.

Basically, as in GPST, the attack determines the mean curves E_i Thus it finally defines the private key. in step I The attack searches everything possible with brute force E_i\ to E_{i+1}The magic component is a tool that shows which one is correct.

(The above are too simplistic, homophones E_i\ to E_{i+1} Its attack is not a class 3 but a small force class of 3.)

More important than understanding mathematics, Jonathan Katz, an IEEE member and professor in the Department of Computer Science at the University of Maryland, wrote in an email: “The attack is completely classic, and it doesn’t require quantum computers at all.”