{"id":482301,"date":"2018-04-30T12:34:55","date_gmt":"2018-04-30T19:34:55","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-project&p=482301"},"modified":"2022-12-09T11:18:07","modified_gmt":"2022-12-09T19:18:07","slug":"sike","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/sike\/","title":{"rendered":"Supersingular Isogeny Key Encapsulation (SIKE)"},"content":{"rendered":"

SIKE and SIDH are insecure and should not be used.<\/strong> For more information, please refer to\u00a0the SIKE team’s statement to NIST<\/a>.<\/p>\n

Supersingular Isogeny Key Encapsulation<\/a> (SIKE)\u00a0is a\u00a0post-quantum cryptography collaboration\u00a0between researchers and engineers at Amazon, Florida Atlantic University, Infosec Global, Microsoft Research, Radboud University, Texas Instruments, Universit\u00e9 de Versailles, and the University of Waterloo.<\/p>\n

SIKE is a family of post-quantum key encapsulation mechanisms based on the Supersingular Isogeny Diffie-Hellman (SIDH) key exchange protocol. The algorithms use arithmetic operations on elliptic curves defined over finite fields and compute maps, so-called isogenies, between such curves. The security of SIDH and SIKE relies on the hardness of finding a specific isogeny between two such elliptic curves, or equivalently, of finding a path between them in the isogeny graph. This problem is different from that of computing discrete logarithms on a single elliptic curve.<\/p>\n

The SIDH protocol was first introduced by Jao and De Feo in 2011 and is at the core of a public key encryption scheme which is then used to construct the key encapsulation mechanism SIKE. Further details about the design and performance of SIKE can be accessed in the links below.<\/p>\n

Learn more:<\/h2>\n

SIKE homepage<\/a>
\n
SIKE GitHub<\/a><\/p>\n

More information on this work can also be found on our main\u00a0Post-Quantum Cryptography<\/a> Project page.<\/p>\n","protected":false},"excerpt":{"rendered":"

SIKE and SIDH are insecure and should not be used. For more information, please refer to\u00a0the SIKE team’s statement to NIST. Supersingular Isogeny Key Encapsulation (SIKE)\u00a0is a\u00a0post-quantum cryptography collaboration\u00a0between researchers and engineers at Amazon, Florida Atlantic University, Infosec Global, Microsoft Research, Radboud University, Texas Instruments, Universit\u00e9 de Versailles, and the University of Waterloo. SIKE is […]<\/p>\n","protected":false},"featured_media":482340,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"footnotes":""},"research-area":[243138,13558],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-482301","msr-project","type-msr-project","status-publish","has-post-thumbnail","hentry","msr-research-area-quantum","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"","related-publications":[365990,238356],"related-downloads":[428448,234981],"related-videos":[],"related-groups":[],"related-events":[],"related-opportunities":[],"related-posts":[],"related-articles":[],"tab-content":[],"slides":[],"related-researchers":[{"type":"guest","display_name":"Reza Azarderakhsh","user_id":483105,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Matthew Campagna","user_id":483102,"people_section":"Section name 1","alias":""},{"type":"user_nicename","display_name":"Craig Costello","user_id":31476,"people_section":"Section name 1","alias":"craigco"},{"type":"guest","display_name":"Luca De Feo","user_id":483099,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Basil Hess","user_id":483084,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Amir Jalali","user_id":483060,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"David Jao","user_id":483090,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Brian Koziel","user_id":483087,"people_section":"Section name 1","alias":""},{"type":"user_nicename","display_name":"Patrick Longa","user_id":33271,"people_section":"Section name 1","alias":"plonga"},{"type":"user_nicename","display_name":"Michael Naehrig","user_id":32976,"people_section":"Section name 1","alias":"mnaehrig"},{"type":"guest","display_name":"Joost Renes","user_id":483096,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"Vladimir Soukharev","user_id":483108,"people_section":"Section name 1","alias":""},{"type":"guest","display_name":"David Urbanik","user_id":483093,"people_section":"Section name 1","alias":""}],"msr_research_lab":[],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/482301"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":23,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/482301\/revisions"}],"predecessor-version":[{"id":906525,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/482301\/revisions\/906525"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/482340"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=482301"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=482301"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=482301"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=482301"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=482301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}