Abstract
The pseudorandom sequences generation is a cryptographic systems fundamental aspect that affects cryptographic strength. One of these sequences advanced generating methods involves the use of elliptic curves (ECs), in particular by exploiting the isogeny properties of ECs. This approach not only improves the security features of cryptographic algorithms, but also ensures efficiency and reliability in the generation process. The use of isogenic transformations - morphisms between elliptic curves that preserve their group structure - further enriches the technique by introducing complex algebraic operations that are difficult to solve.
Recent research has detailed the effectiveness of pseudorandom sequence generators based on elliptic curves. Methods have been developed that exploit the properties of elliptic curves over finite fields to generate sequences with low correlation and high linear complexity. There is also another approach that uses linear shift feedback registers (LFSRs) in combination with elliptic curve points to generate pseudorandom sequences.
The new obtained method makes it possible to increase the number of internal states of the Dual_EC_DRBG generator by
√n times, where n is the number of cyclic subgroups of simple order of the initial curve. This increases the complexity of disclosing the law of formation of the DRBG by an attacker. The application of the developed method also allows to avoid the existing disadvantages of Dual_EC_DRBG
The article investigates the use of EC isogenies in the generation of pseudorandom sequences, considering their potential for improving cryptographic strength. By means of a detailed analysis of the algebraic structure and properties of these transformations, a method for PSPs generating is developed that can potentially provide advantages over existing methods in terms of security and efficiency in the transition period to post-quantum cryptography.
Publisher
State Scientific Research Institute of Armament and Military Equipment Testing and Certification
Reference10 articles.
1. NIST SP 800-90A Rev. 1. Recommendation for Random Number Generation Using Deterministic Random Bit Generators. Elaine Barker (NIST), John Kelsey (NIST).
2. Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARM. A. Jalali, R. Azarderakhsh, Mehran Mozaffari Kermani and David Jao. // IEEE Transactions on Dependable and Secure Computing, 16 . – 2019 – С.902-912.
3. An efficient key recovery attack on SIDH (preliminary version). Castryck, W., Decru, T // IACR Cryptol. ePrint Arch. – 2022. – С. 975.
4. Метод генерації псевдовипадкових послідовностей на основі ізоморфних трансформацій еліптичної кривої/ А.В. Бессалов, В.Є. Чевардін // Прикладна радіоелектроніка: наук.-техн. журнал. – 2012. – Том 11. № 2. – С. 234–237.
5. Kaliski Jr. B. S. A pseudo-random bit generator based on elliptic logarithms / B. S. Kaliski Jr. // Advances in Cryptology: Proceedings of Crypto '86 (Lecture Notes in Computer Science, vol. 263), Springer-Verlag, New York, 1987, pp. 84-103.