Pre- and Post-quantum Diffie–Hellman from Groups, Actions, and Isogenies [chapter]

Benjamin Smith
2018 Lecture Notes in Computer Science  
Diffie-Hellman key exchange is at the foundations of publickey cryptography, but conventional group-based Diffie-Hellman is vulnerable to Shor's quantum algorithm. A range of "post-quantum Diffie-Hellman" protocols have been proposed to mitigate this threat, including the Couveignes, Rostovtsev-Stolbunov, SIDH, and CSIDH schemes, all based on the combinatorial and number-theoretic structures formed by isogenies of elliptic curves. Pre-and post-quantum Diffie-Hellman schemes resemble each other
more » ... t the highest level, but the further down we dive, the more differences emerge-differences that are critical when we use Diffie-Hellman as a basic component in more complicated constructions. In this survey we compare and contrast pre-and post-quantum Diffie-Hellman algorithms, highlighting some important subtleties.
doi:10.1007/978-3-030-05153-2_1 fatcat:hrtt6eon7fhnlpfkwxmzwtgd4a