Whatever Happened To Isogenies?

WARNING: the SIKE algorithm is only for research purposes, insecure

--

And, so, isogenies looked to be the next great thing in cybersecurity in replacing ECDH for key exchange, and for us to move towards a post quantum world. For key sizes, it all looked great:

Type      Public key size (B)   Secret key size (B)  Ciphertext size (B)…

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.