Supersingular Isogeny Diffie-Hellman

The Supersingular Isogeny Diffie-Hellman (SIDH) assumption underlies a family of post-quantum key exchange protocols based on the conjectured hardness of computing isogenies between supersingular elliptic curves. SIDH was introduced by Jao and De Feo as a candidate post-quantum key exchange — JDF11. In 2022, a classical polynomial-time attack was discovered that completely breaks SIDH — CD22.

Assumption

Let be a prime and a supersingular elliptic curve over . An isogeny is a non-trivial rational map that preserves the group structure (a group homomorphism).

The SIDH problem: given , the image curve where is a random -torsion point, and auxiliary torsion-point images for a basis of the -torsion subgroup, find an isogeny .

The SIDH key exchange works as follows:

  1. Both parties fix supersingular with , chosen so that
  2. Alice chooses a secret -isogeny ; Bob chooses
  3. They exchange , and images of each other’s torsion points
  4. Shared key: , the -invariant of the common image curve

Known Results

  • SIDH is not broken by quantum computers (unlike discrete log or factoring assumptions) — JDF11
  • SIDH was selected as a NIST post-quantum cryptography candidate (SIKE) before being broken
  • A classical polynomial-time attack on SIDH, using Kani’s theorem and the auxiliary torsion-point information — CD22
  • The attack breaks SIDH completely; SIKE was withdrawn from the NIST competition in 2022

Variations

CSIDH

Commutative SIDH (CSIDH) uses a commutative group action on supersingular curves over (rather than ). Unlike SIDH, CSIDH does not reveal auxiliary torsion-point information, and it has not been broken by the CD22 attack. It is believed to remain a plausible post-quantum assumption, though quantum sub-exponential attacks exist.

SQISign

A post-quantum digital signature scheme based on isogenies, using a different isogeny graph (Deuring correspondence) and not relying on the broken SIDH assumption.

Attacks

  • CD22 classical polynomial-time attack: Exploits the auxiliary torsion-point images in SIDH to recover the secret isogeny efficiently via abelian surface arguments (Kani’s theorem) — CD22
  • Quantum sub-exponential attack on CSIDH: Ciphertext-only quantum attack using the hidden shift problem structure; runs in quantum time
  • The original SIDH assumption (without auxiliary torsion points) may still be hard — this is the basis for exploring modifications