
Research Article
Implementation Aspects of Supersingular Isogeny-Based Cryptographic Hash Function
@INPROCEEDINGS{10.1007/978-3-031-27041-3_2, author={Miraz Uz Zaman and Aaron Hutchinson and Manki Min}, title={Implementation Aspects of Supersingular Isogeny-Based Cryptographic Hash Function}, proceedings={Wireless Internet. 15th EAI International Conference, WiCON 2022, Virtual Event, November 2022, Proceedings}, proceedings_a={WICON}, year={2023}, month={2}, keywords={Post-quantum cryptography Supersingular isogeny Hash CGL Elliptic curves Weierstrass Montgomery Legendre}, doi={10.1007/978-3-031-27041-3_2} }
- Miraz Uz Zaman
Aaron Hutchinson
Manki Min
Year: 2023
Implementation Aspects of Supersingular Isogeny-Based Cryptographic Hash Function
WICON
Springer
DOI: 10.1007/978-3-031-27041-3_2
Abstract
Supersingular isogeny-based cryptosystems are considered an attractive candidate for the post-quantum cryptographic world due to their smaller key sizes. Based on the traversal in a supersingular isogeny graph (expander graph), Charles, Goren, and Lauter proposed a cryptographic hash function also known as CGL hash. In this paper, we present our study on the implementation-related aspects of the compact variation of the standard CGL hash function using different forms of elliptic curves (Weierstrass, Montgomery, and Legendre). Moreover, we show that some redundant computations in the original propositions of the CGL hash function can be avoided by utilizing the unique characteristics of the different forms of the elliptic curve. We also compared the running time and the total number of collisions through the experiments with the implemented algorithms.