Probability Distributions for Elliptic Curves in the CGL Hash Function [article]

Dhruv Bhatia, Kara Fagerstrom, Maximillian Watson
2021 arXiv   pre-print
Hash functions map data of arbitrary length to data of predetermined length. Good hash functions are hard to predict, making them useful in cryptography. We are interested in the elliptic curve CGL hash function, which maps a bitstring to an elliptic curve by traversing an input-determined path through an isogeny graph. The nodes of an isogeny graph are elliptic curves, and the edges are special maps betwixt elliptic curves called isogenies. Knowing which hash values are most likely informs us
more » ... f potential security weaknesses in the hash function. We use stochastic matrices to compute the expected probability distributions of the hash values. We generalize our experimental data into a theorem that completely describes all possible probability distributions of the CGL hash function. We use this theorem to evaluate the collision resistance of the CGL hash function and compare this to the collision resistance of an "ideal" hash function.
arXiv:2108.06457v1 fatcat:7hxjbn2jxzdslj4tmiviks6m3i