PQC CSIKE algorithm on noncyclic Edwards curves with simultaneous formation of two independent keys encapsulation
DOI:
https://doi.org/10.30837/rt.2026.1.224.04Keywords:
the curve in generalized Edwards form, complete Edwards curve, twisted Edwards curve, quadratic Edwards curve, curve order, point order, isomorphism, isogeny, group action function, public key, secret key, encapsulation key, w-coordinatesAbstract
Using a 2-processor computer, parallel calculation of two different encapsulation keys in the original CSIKE algorithm with one public key instead of two in CSIDH is proposed. The conditions for its implementation on two classes of noncyclic Edwards curves are substantiated. The properties of quadratic and twisted supersingular Edwards curves that form quadratic ttwist pairs with order p+1≡0mod8 over the prime field Fp are considered. For every curve in these classes with parameter d, there exists an isomorphic curve with parameter d^-1. On a set of isomorphic curves, the second encapsulation key can be computed simultaneously with the first. For all isogenies of degrees 3, 5, 7, the parameters d of chains of isogenies of noncyclic supersingular Edwards curves on period T of chains of isogenies for p=839 is calculated. The simulation of the CSIKE scheme with Alice encrypting two independent keys encapsulation with Bob's public key, as well as the stage of decapsulation by Bob of these keys, is considered. The implementation of parallel computations provides almost perfect protection against side-channel attacks, because it is impossible to set the task of measuring the computation time of fragments of two different isogeny chains.
References
Castryck W., Lange T., Martindale C., Panny L., Renes J. CSIDH: An efficient post-quantum commutative group action // Peyrin, T., Galbraith, S. (eds.) Advances in Cryptology {ASIACRYPT 2018. P. 395{427. Springer Inter-national Publishing, Cham (2018).
Bernstein D.J., Lange T. Faster Addition and Doubling on Elliptic Curves // Advances in Cryptology–ASIACRYPT’2007 (Proc. 13th Int. Conf. on the Theory and Application of Cryptology and Information Security. Kuching, Malaysia. December 2–6, 2007). Lect. Notes Comp. Sci. V. 4833, Berlin: Springer, 2007. P. 29.
Bernstein D.J., Birkner P., Joye M., Lange T., Peters C. Twisted Edwards curves // AFRICACRYPT 2008. Vol. 5023 of LNCS. Springer, 2008. Р.389–405.
Moody D., Shumow D. Analogues of Velus formulas for isogenies on alternate models of elliptic curves // Mathematics of Computation. 2016. Vol. 85, no. 300. P. 1929–1951.
Suhri Kim, Kisoon Yoon, Young-Ho Park, and Seokhie Hong. Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves // Security and Communication Networks, 2019.
Suhri Kim, Kisoon Yoon, Jihoon Kwon, Seokhie Hong, and Young-Ho Park Efficient Isogeny Computations on Twisted Edwards Curves Hindawi // Security and Communication Networks. 2019. Vol. 2018. Article ID 5747642.
Bessalov A., Sokolov V., Abramov S., Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves // MDPI, Cryptography, 2024. Р.2–17.
Onuki H., Aikawa Y., Yamazaki T., Takagi T. A Faster Constant-time Algorithm of CSIDH keeping Two Points. ASIACRYPT, 2020.
Bessalov A.V., Kovalchuk L.V., Abramov S.V Randomization of CSIDH algorithm on quadratic and twisted Edwards curves // Кібербезпека: освіта, наука, техніка. 2022. Т.1, №17. С.128–144.
Bessalov A., Sokolov V., Skladannyi P., Zhyltsov O. Computing of odd degree isogenies on supersingular twisted Edwards curves // CEUR Workshop Proceedings. 2021. Vol. 2923 P. 1–11.
Bessalov A., Sokolov V., Skladannyi P. Abramov S., Zhyltsov O. Modeling CSIKE Algorithm on Non-Cyclic Edwards Curves // CEUR Workshop Proceedings. 2022. Vol. 3288. P. 1–10.
Бессалов А.В., Абрамов С.В. Алгоритм PQC CSIKE на нециклічних кривих Едвардса // Кібернетика та системний аналіз. 2023.Т. 59, №6. С.3–18.
Бессалов А.В. Эллиптические кривые в форме Эдвардса и криптография : моногр. Киев : Политехни-ка, 2017. 272 с.
Tomoki Moriya, Hiroshi Onuki, and Tsuyoshi Takagi. How to construct CSIDH on Edwards curves // Cryp-tographers’ Track at the RSA Conference–CT-RSA 2020. Springer, 2020. P. 512–537.
Bessalov A. V. On correctness of implementation conditions CSIDH algorithm on Edwards curves // Радіотехніка. 2022. Вип. 208. С.16–27.
Bessalov A.V., Kovalchuk L.V. Supersingular Twisted Edwards Curves Over Prime Fields. I. Supersingular Twisted Edwards Curves with j-Invariants Equal to Zero and 123. // Cybernetics and Systems Analysis. 2019. Vol. 55(3). Р. 347–353.
Bessalov A.V., Kovalchuk L.V. Supersingular Twisted Edwards Curves over Prime Fields.* II. Supersingular Twisted Edwards Curves with the j-Invariant Equal to 663 // Cybernetics and Systems Analysis. 2019. Vol. 55(5). Р. 731–741.
Bessalov A., Abramov S., Sokolov V., Skladannyi P., & Zhyltsov, O. (2023). Multifunctional CRS Encryp-tion Scheme on Isogenies of Non-Supersingular Edwards Curves // Proceedings of the Workshop on Classic, Quantum, and Post-Quantum Cryptography (CQPC). 2023. Vol. 3504. P. 12–25. (Scopus Q4).
Washington L. C. Elliptic Curvres. Number Theory and Cryptography. Second Edition. CRC Press, 2008.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).

