Skip to content
Patch for OpenSSL 1.0.2g to support the Supersingular Isogeny-based Diffie-Hellman (SIDH) key exchange using the Microsoft Research implementation.
Branch: master
Clone or download
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
original Add openssl submodule at 1.0.2g tag Oct 12, 2016
.gitignore Initial commit Oct 12, 2016
.gitmodules Add openssl submodule at 1.0.2g tag Oct 12, 2016
README.md Update README.md Oct 12, 2016
sidh-for-openssl-1.0.2g.patch Add sidh-for-openssl-1.0.2g.patch from MSR Oct 12, 2016

README.md

SIDH for Open SSL

This release contains a patch for OpenSSL 1.0.2g to support the Supersingular Isogeny-based Diffie-Hellman (SIDH) key exchange1, using the implementation by Microsoft Research2. This scheme provides approximately 128 bits of quantum security and 192 bits of classical security.

Details

The library specifies four ciphersuites:

  • SIDH-ECDSA-AES128-GCM-SHA256
  • SIDH-RSA-AES128-GCM-SHA256
  • SIDH-ECDHE-ECDSA-AES128-GCM-SHA256
  • SIDH-ECDHE-RSA-AES128-GCM-SHA256

The first two consist of a SIDH key exchange, as described in [1], authentication based on ECDSA or RSA digital signatures, authenticated encryption (with associated data) (AEAD) based on AES-128 in GCM (Galois Counter Mode); key derivation and hashing based on SHA-256. The last two offer hybrid ciphersuites that are as above, except the key exchange includes both SIDH and ECDH key exchange; the pre-master secret is the concatenation of the ECDH shared secret and the SIDH shared secret. All these ciphersuites require TLSv1.2 because of the use of AES-GCM.

References

  1. Craig Costello, Patrick Longa, and Michael Naehrig (Microsoft Research). "Efficient algorithms for supersingular isogeny Diffe-Hellman." https://eprint.iacr.org/2016/413.pdf.
  2. http://research.microsoft.com/en-us/projects/sidh/
  3. https://openssl.org/source/old/1.0.2/openssl-1.0.2g.tar.gz
You can’t perform that action at this time.