Abstract
In the field of post-quantum security, isogeny-based cryptography stands out for its ability to fight quantum attacks. One of the key operations in isogeny-based schemes is finite field multiplication, which plays a crucial role in cryptographic protocols such as key exchange and digital signatures. To ensure practical implementations of these schemes, efficient finite field multiplication is essential. In this research, a novel optimization approach, the Crossover-Boosted Water Cycle Algorithm (CB-WCA), to enhance the efficiency of finite field multiplication in isogeny-based cryptography is proposed. By using both the WCA and a crossover method inspired by genetic algorithms, the CB-WCA effectively explores solution areas, aiming for the best solutions. The formulation of the finite field multiplication optimization problem and an objective function that quantifies the efficiency of the multiplication process based on computational cost is presented and defined. The CB-WCA is then applied to find the optimal set of parameters for finite field multiplication algorithms. Extensive experimental evaluations are conducted, comparing the performance of the CB-WCA-optimized algorithms with traditional optimization methods and other metaheuristic algorithms. Through the findings, it is evident that the CB-WCA stands out for its ability to achieve faster execution times and decrease computational costs. Furthermore, the optimized finite field multiplication algorithms are integrated into isogeny-based cryptographic schemes and evaluate their impact on cryptographic protocol efficiency and security. Real-world implementations showcase the practical applicability of the optimized algorithms in hardware and software environments. To ensure the security of the optimized algorithms, rigorous cryptanalysis is performed to verify their resilience against potential attacks, ensuring they meet the highest standards of security.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11128-023-04232-6/MediaObjects/11128_2023_4232_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11128-023-04232-6/MediaObjects/11128_2023_4232_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11128-023-04232-6/MediaObjects/11128_2023_4232_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11128-023-04232-6/MediaObjects/11128_2023_4232_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11128-023-04232-6/MediaObjects/11128_2023_4232_Fig5_HTML.png)
Similar content being viewed by others
Availability of data and material
Data sharing is not applicable to this article as no new data were created or analyzed in this study.
Code availability
Not applicable.
References
Pirandola, S., Andersen, U.L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., Ottaviani, C., Pereira, J.L.: Advances in quantum cryptography. Adv. Opt. Photon. 12(4), 1012–1236 (2020)
Peng, C., Chen, J., Zeadally, S., He, D.: Isogeny-based cryptography: a promising post-quantum technique. IT Prof. 21(6), 27–32 (2019)
Taraskin, O., Soukharev, V., Jao, D., LeGrow, J.T.: Towards isogeny-based password-authenticated key establishment. J. Math. Cryptol. 15(1), 18–30 (2020)
Sagar Hossen, M., Tabassum, T., Ashiqul Islam, M., Karim, R., Rumi, L.S., Kobita, A.A.: Digital signature authentication using asymmetric key cryptography with different byte number. In: Evolutionary Computing and Mobile Sustainable Networks: Proceedings of ICECMSN 2020. Springer Singapore, pp. 845–851 (2021)
Dey, K., Debnath, S.K., Stănică, P., Srivastava, V.: A post-quantum signcryption scheme using isogeny based cryptography. J. Inf. Secur. Appl. 69, 103280 (2022)
Eom, S., Lee, H.S., Song, K.: Memory-efficient algorithm for scalar multiplications on twisted Edwards curves for isogeny-based cryptosystems. Math. Probl. Eng. 8, 1–8 (2022)
Huang, Y., Zhang, F., Hu, Z., Liu, Z.: Optimized arithmetic operations for isogeny-based cryptography on Huff curves. In: Australasian Conference on Information Security and Privacy. Cham: Springer International Publishing, pp. 23–40 (2020)
Joseph, D., Misoczki, R., Manzano, M., Tricot, J., Pinuaga, F.D., Lacombe, O., Leichenauer, S., Hidary, J., Venables, P., Hansen, R.: Transitioning organizations to post-quantum cryptography. Nature 605(7909), 237–243 (2022)
Kim, S., Yoon, K., Kwon, J., Park, Y.H., Hong, S.: New hybrid method for isogeny-based cryptosystems using Edwards curves. IEEE Trans. Inf. Theory 66(3), 1934–1943 (2019)
Eskandar, H., Sadollah, A., Bahreininejad, A., Hamdi, M.: Water cycle algorithm–A novel metaheuristic optimization method for solving constrained engineering optimization problems. Comput. Struct. 110, 151–166 (2012)
Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67(6), 661 (1991)
Yin, H.L., Fu, Y., Li, C.L., Weng, C.X., Li, B.H., Gu, J., Lu, Y.S., Huang, S., Chen, Z.B.: Experimental quantum secure network with digital signatures and encryption. Natl. Sci. Rev. 10(4), 228 (2023)
Xie, Y.M., Lu, Y.S., Weng, C.X., Cao, X.Y., Jia, Z.Y., Bao, Y., Wang, Y., Fu, Y., Yin, H.L., Chen, Z.B.: Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference. PRX Quantum 3(2), 020315 (2022)
Gu, J., Cao, X.Y., Fu, Y., He, Z.W., Yin, Z.J., Yin, H.L., Chen, Z.B.: Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources. Sci. Bull. 67(21), 2167–2175 (2022)
Pickston, A., Ho, J., Ulibarrena, A., Grasselli, F., Proietti, M., Morrison, C.L., Barrow, P., Graffitti, F., Fedrizzi, A.: Experimental network advantage for quantum conference key agreement. arXiv preprint arXiv:2207.01643 (2022)
Maleszewski, W.: The application of isogenic elliptic curves and graphs in post-quantum cryptography. Pol. J. Appl. Sci. 4(3), 96–101 (2019)
Ouyang, M., Wang, Z., Li, F.: Digital signature with cryptographic reverse firewalls. J. Syst. Architect. 116, 102029 (2021)
Cervantes-Vázquez, D., Ochoa-Jiménez, E., Rodríguez-Henríquez, F.: Extended supersingular isogeny Diffie-Hellman key exchange protocol: revenge of the SIDH. IET Inf. Secur. 15(5), 364–374 (2021)
Aljamaly, K.T.R., Ajeena, R.K.K.: The elliptic scalar multiplication graph and its application in elliptic curve cryptography. J. Discrete Math. Sci. Cryptogr. 24(6), 1793–1807 (2021)
Canto, A.C., Mozaffari-Kermani, M., Azarderakhsh, R.: Reliable CRC-based error detection constructions for finite field multipliers with applications in cryptography. IEEE Trans. Very Large Scale Integr. VLSI Syst. 29(1), 232–236 (2020)
Bessalov, A., Sokolov, V.Y., Skladannyi, P.: Modeling of 3-and 5-isogenies of supersingular Edwards curves. MoMLeT&DS 2631(I), 30–39 (2020)
He, Y., Zhao, C., Dai, G., He, K., Geng, X., Liu, J., Chen, W.: Quantum modular multiplier via binary-exponent-based recombination. Quantum Inf. Process. 21(12), 391 (2022)
Gidney, C.: Asymptotically efficient quantum Karatsuba multiplication. arXiv preprint arXiv:1904.07356 (2019)
Mullai, A., Mani, K.: Enhancing the security in RSA and elliptic curve cryptography based on addition chain using simplified swarm optimization and particle swarm optimization for mobile devices. Int. J. Inf. Technol. 13, 551–564 (2021)
Mirjalili, S.: Genetic algorithm. Evolutionary Algorithms and Neural Networks: Theory and Applications, pp. 43–55 (2019)
Dorigo, M., Stützle, T.: Ant colony optimization: overview and recent advances Springer International Publishing, pp. 311–351 (2019)
Delahaye, D., Chaimatanan, S., Mongeau, M.: Simulated annealing: From basics to applications. Handbook of metaheuristics, pp. 1–35 (2019)
Bansal, J.C.: Particle swarm optimization. Evolutionary and swarm intelligence algorithms, pp. 11–23 (2019)
Saemi, B., Sadeghilalimi, M., Hosseinabadi, A.A.R., Mouhoub, M., Sadaoui, S.: A new optimization approach for task scheduling problem using water cycle algorithm in mobile cloud computing. In: 2021 IEEE Congress on Evolutionary Computation (CEC). IEEE, pp. 530–539 (2021)
Truger, F., Beisel, M., Barzen, J., Leymann, F., Yussupov, V.: Selection and optimization of hyperparameters in warm-started quantum optimization for the MaxCut problem. Electronics 11(7), 1033 (2022)
Wu, C., Huang, F., Dai, J., Zhou, N.: Quantum SUSAN edge detection based on double chains quantum genetic algorithm. Phys. A Stat. Mech. Appl. 605, 128017 (2022)
Zhou, N.R., Xia, S.H., Ma, Y., Zhang, Y.: Quantum particle swarm optimization algorithm with the truncated mean stabilization strategy. Quantum Inf. Process. 21(2), 42 (2022)
Zhou, N.R., Zhang, T.F., Xie, X.W., Wu, J.Y.: Hybrid quantum–classical generative adversarial networks for image generation via learning discrete distribution. Sig. Process. Image Comm. 110, 116891 (2023)
Tamilvizhi, T., Surendran, R., Anbazhagan, K., Rajkumar, K.: Quantum behaved particle swarm optimization-based deep transfer learning model for sugarcane leaf disease detection and classification. Math. Probl. Eng. 2022, 12 (2022)
Velusamy, D., Pugalendhi, G.: Water cycle algorithm tuned fuzzy expert system for trusted routing in smart grid communication network. IEEE Trans. Fuzzy Syst. 28(6), 1167–1177 (2020)
Dhavamani, L., Prem Priya, P.: Energy-efficient and privacy-preserving approach for internet of things nodes using a novel hybrid fuzzy water cycle and evaporation strategy and matrix-based Rivest–Shamir–Adleman encryption algorithm. Concurr. Comput. Pract. Exp. 34(27), 7336 (2022)
Emami Khansari, M., Sharifian, S.: A modified water cycle evolutionary game theory algorithm to utilize QoS for IoT services in cloud-assisted fog computing environments. J. Supercomput. 76(7), 5578–5608 (2020)
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
All authors agreed on the content of the study. JS and CA collected all the data for analysis. JS agreed on the methodology. JS and CA completed the analysis based on agreed steps. Results and conclusions are discussed and written together. The author read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethics approval
This article does not contain any studies with human participants.
Human and animal rights
This article does not contain any studies with human or animal subjects performed by any of the authors.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Consent to participate
Not applicable.
Consent for publication
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sankaran, J., Arumugam, C. Exploring the solution space: CB-WCA for efficient finite field multiplication in post-quantum cryptography. Quantum Inf Process 23, 28 (2024). https://doi.org/10.1007/s11128-023-04232-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-023-04232-6