Definition and properties
A supersingular isogeny graph is determined by choosing a large prime number and a small prime number , and considering the class of all supersingular elliptic curves defined over the finite field . There are approximately such curves, each two of which can be related by isogenies. The vertices in the supersingular isogeny graph represent these curves (or more concretely, their -invariants, elements of ) and the edges represent isogenies of degree between two curves. The supersingular isogeny graphs are - regular graphs, meaning that each vertex has exactly neighbors. They were proven by Pizer to be Ramanujan graphs, graphs with optimal expansion properties for their degree. The proof is based on Pierre Deligne's proof of theCryptographic applications
One proposal for a cryptographic hash function involves starting from a fixed vertex of a supersingular isogeny graph, using the bits of the binary representation of an input value to determine a sequence of edges to follow in a walk in the graph, and using the identity of the vertex reached at the end of the walk as the hash value for the input. The security of the proposed hashing scheme rests on the assumption that it is difficult to find paths in this graph that connect arbitrary pairs of vertices. It has also been proposed to use walks in two supersingular isogeny graphs with the same vertex set but different edge sets (defined using different choices of the parameter) to develop a key exchange primitive analogous toReferences
{{reflist, refs= {{citation , last1 = Charles , first1 = Denis X. , last2 = Lauter , first2 = Kristin E. , author2-link = Kristin Lauter , last3 = Goren , first3 = Eyal Z. , doi = 10.1007/s00145-007-9002-x , issue = 1 , journal = Journal of Cryptology , mr = 2496385 , pages = 93–113 , title = Cryptographic hash functions from expander graphs , url = https://eprint.iacr.org/2006/021.pdf , volume = 22 , year = 2009, s2cid = 6417679 {{citation , last1 = Eisenträger , first1 = Kirsten , author1-link = Kirsten Eisenträger , last2 = Hallgren , first2 = Sean , last3 = Lauter , first3 = Kristin , author3-link = Kristin Lauter , last4 = Morrison , first4 = Travis , last5 = Petit , first5 = Christophe , contribution = Supersingular isogeny graphs and endomorphism rings: Reductions and solutions , contribution-url = https://eprint.iacr.org/2018/371.pdf , doi = 10.1007/978-3-319-78372-7_11 , editor1-first = Jesper Buus , editor1-last = Nielsen , editor2-first = Vincent , editor2-last = Rijmen , editor2-link = Vincent Rijmen , mr = 3794837 , pages = 329–368 , publisher = Springer , location = Cham , series = Lecture Notes in Computer Science , title = Advances in Cryptology – EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018, Proceedings, Part III , volume = 10822 , year = 2018, url = http://pure-oai.bham.ac.uk/ws/files/47705132/Supersingular.pdf {{citation , last1 = De Feo , first1 = Luca , last2 = Jao , first2 = David , last3 = Plût , first3 = Jérôme , doi = 10.1515/jmc-2012-0015 , issue = 3 , journal = Journal of Mathematical Cryptology , mr = 3259113 , pages = 209–247 , title = Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies , url = https://eprint.iacr.org/2011/506.pdf , volume = 8 , year = 2014, s2cid = 10873244 {{citation, url=https://arstechnica.com/information-technology/2022/08/sike-once-a-post-quantum-encryption-contender-is-koed-in-nist-smackdown/, magazine=Ars Technica, title=Post-quantum encryption contender is taken out by single-core PC and 1 hour: Leave it to mathematicians to muck up what looked like an impressive new algorithm, first=Dan, last=Goodin, date=August 2, 2022 {{citation , last = Mestre , first = J.-F. , contribution = La méthode des graphes. Exemples et applications , mr = 891898 , pages = 217–242 , publisher = Nagoya University , title = Proceedings of the international conference on class numbers and fundamental units of algebraic number fields (Katata, 1986) , year = 1986 {{citation , last = Pizer , first = Arnold K. , doi = 10.1090/S0273-0979-1990-15918-X , issue = 1 , journal = Bulletin of the American Mathematical Society , mr = 1027904 , pages = 127–137 , series = New Series , title = Ramanujan graphs and Hecke operators , volume = 23 , year = 1990, doi-access = free {{citation , last = Pizer , first = Arnold K. , contribution = Ramanujan graphs , mr = 1486836 , pages = 159–178 , publisher = American Mathematical Society , series = AMS/IP Stud. Adv. Math. , title = Computational perspectives on number theory (Chicago, IL, 1995) , volume = 7 , year = 1998 Application-specific graphs Computational number theory Elliptic curve cryptography Regular graphs