Skip to main content
Log in

Exploring the solution space: CB-WCA for efficient finite field multiplication in post-quantum cryptography

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

In the field of post-quantum security, isogeny-based cryptography stands out for its ability to fight quantum attacks. One of the key operations in isogeny-based schemes is finite field multiplication, which plays a crucial role in cryptographic protocols such as key exchange and digital signatures. To ensure practical implementations of these schemes, efficient finite field multiplication is essential. In this research, a novel optimization approach, the Crossover-Boosted Water Cycle Algorithm (CB-WCA), to enhance the efficiency of finite field multiplication in isogeny-based cryptography is proposed. By using both the WCA and a crossover method inspired by genetic algorithms, the CB-WCA effectively explores solution areas, aiming for the best solutions. The formulation of the finite field multiplication optimization problem and an objective function that quantifies the efficiency of the multiplication process based on computational cost is presented and defined. The CB-WCA is then applied to find the optimal set of parameters for finite field multiplication algorithms. Extensive experimental evaluations are conducted, comparing the performance of the CB-WCA-optimized algorithms with traditional optimization methods and other metaheuristic algorithms. Through the findings, it is evident that the CB-WCA stands out for its ability to achieve faster execution times and decrease computational costs. Furthermore, the optimized finite field multiplication algorithms are integrated into isogeny-based cryptographic schemes and evaluate their impact on cryptographic protocol efficiency and security. Real-world implementations showcase the practical applicability of the optimized algorithms in hardware and software environments. To ensure the security of the optimized algorithms, rigorous cryptanalysis is performed to verify their resilience against potential attacks, ensuring they meet the highest standards of security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Availability of data and material

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

Code availability

Not applicable.

References

  1. Pirandola, S., Andersen, U.L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., Ottaviani, C., Pereira, J.L.: Advances in quantum cryptography. Adv. Opt. Photon. 12(4), 1012–1236 (2020)

    Article  Google Scholar 

  2. Peng, C., Chen, J., Zeadally, S., He, D.: Isogeny-based cryptography: a promising post-quantum technique. IT Prof. 21(6), 27–32 (2019)

    Article  Google Scholar 

  3. Taraskin, O., Soukharev, V., Jao, D., LeGrow, J.T.: Towards isogeny-based password-authenticated key establishment. J. Math. Cryptol. 15(1), 18–30 (2020)

    Article  MathSciNet  Google Scholar 

  4. Sagar Hossen, M., Tabassum, T., Ashiqul Islam, M., Karim, R., Rumi, L.S., Kobita, A.A.: Digital signature authentication using asymmetric key cryptography with different byte number. In: Evolutionary Computing and Mobile Sustainable Networks: Proceedings of ICECMSN 2020. Springer Singapore, pp. 845–851 (2021)

  5. Dey, K., Debnath, S.K., Stănică, P., Srivastava, V.: A post-quantum signcryption scheme using isogeny based cryptography. J. Inf. Secur. Appl. 69, 103280 (2022)

    Google Scholar 

  6. Eom, S., Lee, H.S., Song, K.: Memory-efficient algorithm for scalar multiplications on twisted Edwards curves for isogeny-based cryptosystems. Math. Probl. Eng. 8, 1–8 (2022)

    Article  Google Scholar 

  7. Huang, Y., Zhang, F., Hu, Z., Liu, Z.: Optimized arithmetic operations for isogeny-based cryptography on Huff curves. In: Australasian Conference on Information Security and Privacy. Cham: Springer International Publishing, pp. 23–40 (2020)

  8. Joseph, D., Misoczki, R., Manzano, M., Tricot, J., Pinuaga, F.D., Lacombe, O., Leichenauer, S., Hidary, J., Venables, P., Hansen, R.: Transitioning organizations to post-quantum cryptography. Nature 605(7909), 237–243 (2022)

    Article  ADS  Google Scholar 

  9. Kim, S., Yoon, K., Kwon, J., Park, Y.H., Hong, S.: New hybrid method for isogeny-based cryptosystems using Edwards curves. IEEE Trans. Inf. Theory 66(3), 1934–1943 (2019)

    Article  MathSciNet  Google Scholar 

  10. Eskandar, H., Sadollah, A., Bahreininejad, A., Hamdi, M.: Water cycle algorithm–A novel metaheuristic optimization method for solving constrained engineering optimization problems. Comput. Struct. 110, 151–166 (2012)

    Article  Google Scholar 

  11. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67(6), 661 (1991)

    Article  ADS  MathSciNet  Google Scholar 

  12. Yin, H.L., Fu, Y., Li, C.L., Weng, C.X., Li, B.H., Gu, J., Lu, Y.S., Huang, S., Chen, Z.B.: Experimental quantum secure network with digital signatures and encryption. Natl. Sci. Rev. 10(4), 228 (2023)

    Article  ADS  Google Scholar 

  13. Xie, Y.M., Lu, Y.S., Weng, C.X., Cao, X.Y., Jia, Z.Y., Bao, Y., Wang, Y., Fu, Y., Yin, H.L., Chen, Z.B.: Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference. PRX Quantum 3(2), 020315 (2022)

    Article  ADS  Google Scholar 

  14. Gu, J., Cao, X.Y., Fu, Y., He, Z.W., Yin, Z.J., Yin, H.L., Chen, Z.B.: Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources. Sci. Bull. 67(21), 2167–2175 (2022)

    Article  Google Scholar 

  15. Pickston, A., Ho, J., Ulibarrena, A., Grasselli, F., Proietti, M., Morrison, C.L., Barrow, P., Graffitti, F., Fedrizzi, A.: Experimental network advantage for quantum conference key agreement. arXiv preprint arXiv:2207.01643 (2022)

  16. Maleszewski, W.: The application of isogenic elliptic curves and graphs in post-quantum cryptography. Pol. J. Appl. Sci. 4(3), 96–101 (2019)

    Google Scholar 

  17. Ouyang, M., Wang, Z., Li, F.: Digital signature with cryptographic reverse firewalls. J. Syst. Architect. 116, 102029 (2021)

    Article  Google Scholar 

  18. Cervantes-Vázquez, D., Ochoa-Jiménez, E., Rodríguez-Henríquez, F.: Extended supersingular isogeny Diffie-Hellman key exchange protocol: revenge of the SIDH. IET Inf. Secur. 15(5), 364–374 (2021)

    Article  Google Scholar 

  19. Aljamaly, K.T.R., Ajeena, R.K.K.: The elliptic scalar multiplication graph and its application in elliptic curve cryptography. J. Discrete Math. Sci. Cryptogr. 24(6), 1793–1807 (2021)

    Article  MathSciNet  Google Scholar 

  20. Canto, A.C., Mozaffari-Kermani, M., Azarderakhsh, R.: Reliable CRC-based error detection constructions for finite field multipliers with applications in cryptography. IEEE Trans. Very Large Scale Integr. VLSI Syst. 29(1), 232–236 (2020)

    Article  Google Scholar 

  21. Bessalov, A., Sokolov, V.Y., Skladannyi, P.: Modeling of 3-and 5-isogenies of supersingular Edwards curves. MoMLeT&DS 2631(I), 30–39 (2020)

    Google Scholar 

  22. He, Y., Zhao, C., Dai, G., He, K., Geng, X., Liu, J., Chen, W.: Quantum modular multiplier via binary-exponent-based recombination. Quantum Inf. Process. 21(12), 391 (2022)

    Article  ADS  MathSciNet  Google Scholar 

  23. Gidney, C.: Asymptotically efficient quantum Karatsuba multiplication. arXiv preprint arXiv:1904.07356 (2019)

  24. Mullai, A., Mani, K.: Enhancing the security in RSA and elliptic curve cryptography based on addition chain using simplified swarm optimization and particle swarm optimization for mobile devices. Int. J. Inf. Technol. 13, 551–564 (2021)

    Google Scholar 

  25. Mirjalili, S.: Genetic algorithm. Evolutionary Algorithms and Neural Networks: Theory and Applications, pp. 43–55 (2019)

  26. Dorigo, M., Stützle, T.: Ant colony optimization: overview and recent advances Springer International Publishing, pp. 311–351 (2019)

  27. Delahaye, D., Chaimatanan, S., Mongeau, M.: Simulated annealing: From basics to applications. Handbook of metaheuristics, pp. 1–35 (2019)

  28. Bansal, J.C.: Particle swarm optimization. Evolutionary and swarm intelligence algorithms, pp. 11–23 (2019)

  29. Saemi, B., Sadeghilalimi, M., Hosseinabadi, A.A.R., Mouhoub, M., Sadaoui, S.: A new optimization approach for task scheduling problem using water cycle algorithm in mobile cloud computing. In: 2021 IEEE Congress on Evolutionary Computation (CEC). IEEE, pp. 530–539 (2021)

  30. Truger, F., Beisel, M., Barzen, J., Leymann, F., Yussupov, V.: Selection and optimization of hyperparameters in warm-started quantum optimization for the MaxCut problem. Electronics 11(7), 1033 (2022)

    Article  Google Scholar 

  31. Wu, C., Huang, F., Dai, J., Zhou, N.: Quantum SUSAN edge detection based on double chains quantum genetic algorithm. Phys. A Stat. Mech. Appl. 605, 128017 (2022)

    Article  MathSciNet  Google Scholar 

  32. Zhou, N.R., Xia, S.H., Ma, Y., Zhang, Y.: Quantum particle swarm optimization algorithm with the truncated mean stabilization strategy. Quantum Inf. Process. 21(2), 42 (2022)

    Article  ADS  MathSciNet  Google Scholar 

  33. Zhou, N.R., Zhang, T.F., Xie, X.W., Wu, J.Y.: Hybrid quantum–classical generative adversarial networks for image generation via learning discrete distribution. Sig. Process. Image Comm. 110, 116891 (2023)

    Article  Google Scholar 

  34. Tamilvizhi, T., Surendran, R., Anbazhagan, K., Rajkumar, K.: Quantum behaved particle swarm optimization-based deep transfer learning model for sugarcane leaf disease detection and classification. Math. Probl. Eng. 2022, 12 (2022)

    Article  Google Scholar 

  35. Velusamy, D., Pugalendhi, G.: Water cycle algorithm tuned fuzzy expert system for trusted routing in smart grid communication network. IEEE Trans. Fuzzy Syst. 28(6), 1167–1177 (2020)

    Article  Google Scholar 

  36. Dhavamani, L., Prem Priya, P.: Energy-efficient and privacy-preserving approach for internet of things nodes using a novel hybrid fuzzy water cycle and evaporation strategy and matrix-based Rivest–Shamir–Adleman encryption algorithm. Concurr. Comput. Pract. Exp. 34(27), 7336 (2022)

    Article  Google Scholar 

  37. Emami Khansari, M., Sharifian, S.: A modified water cycle evolutionary game theory algorithm to utilize QoS for IoT services in cloud-assisted fog computing environments. J. Supercomput. 76(7), 5578–5608 (2020)

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

All authors agreed on the content of the study. JS and CA collected all the data for analysis. JS agreed on the methodology. JS and CA completed the analysis based on agreed steps. Results and conclusions are discussed and written together. The author read and approved the final manuscript.

Corresponding author

Correspondence to Janani Sankaran.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethics approval

This article does not contain any studies with human participants.

Human and animal rights

This article does not contain any studies with human or animal subjects performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Consent to participate

Not applicable.

Consent for publication

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sankaran, J., Arumugam, C. Exploring the solution space: CB-WCA for efficient finite field multiplication in post-quantum cryptography. Quantum Inf Process 23, 28 (2024). https://doi.org/10.1007/s11128-023-04232-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-023-04232-6

Keywords

Navigation