On July 30, 2022, two Belgian cryptographers posted a paper to the IACR ePrint archive. Within days, the most mathematically distinctive candidate in NIST's post-quantum competition was dead. The attack ran in about ten minutes on a laptop core, and in roughly an hour on 2013-vintage server hardware. SIKE, the Key Encapsulation Mechanism built around Supersingular Isogeny Diffie-Hellman, had survived five years of cryptanalysis and was a Round 4 NIST candidate. Then Wouter Castryck and Thomas Decru connected it to a 1997 paper on genus-2 curves, and it was over.
This is the story of how that happened, and what the mathematics looked like.
Why we need more than one post-quantum family
Why care about isogeny-based schemes specifically? NIST finalized three post-quantum standards in August 2024: ML-KEM (key encapsulation), ML-DSA (signatures), and SLH-DSA (hash-based signatures). ML-KEM and ML-DSA both rest on structured-lattice hardness assumptions, Module-LWE and Module-SIS. Two of the three first-wave standards collapse if structured-lattice problems turn out to be easier than we think.
The diversity argument has a classical analogy. Finite-field Diffie-Hellman and elliptic-curve Diffie-Hellman are both discrete-log protocols. They share the same logical structure but live in different mathematical worlds. When index-calculus algorithms made finite-field discrete log weaker per bit than expected, the ecosystem had ECDH as an escape hatch: same problem, different group. You could switch without redesigning your protocol layer.
Post-quantum security needs the same property. We want KEMs and signature schemes whose security claims don't all collapse under a single mathematical hammer. The post-quantum families in play today are genuinely distinct:
- Lattice-based (ML-KEM, ML-DSA, FALCON): hardness of Learning With Errors and Short Integer Solution. Fast, compact, well-studied since Regev (2005).
- Code-based (Classic McEliece, HQC, BIKE): hardness of decoding a random linear code. McEliece dates to 1978 — one of the oldest public-key proposals still standing.
- Hash-based (SLH-DSA / SPHINCS+): security reduces to collision resistance of an underlying hash. Extremely conservative; signatures are large.
- Isogeny-based (formerly SIDH/SIKE; now CSIDH and SQIsign): hardness of finding isogenies between elliptic curves. The smallest keys of any post-quantum family.
- Multivariate and symmetric (UOV, MAYO, FAEST, and others): various other mathematical frameworks, mostly targeting signatures.
The isogeny family was the most algebraically interesting of the lot, and SIDH specifically had the smallest public keys of any post-quantum KEM ever seriously proposed. When it broke, it broke structurally: not because someone found a better algorithm for the underlying hard problem, but because the protocol design leaked more information than was safe. That distinction matters.
Elliptic curves over finite fields
An elliptic curve over a field (with ) is, in short Weierstrass form, a smooth projective variety defined by
The condition rules out singular points (cusps and nodes). Together with a "point at infinity" as the identity, the -rational points form an abelian group under the chord-and-tangent addition law: draw the line through two points, take the third intersection with the curve, reflect over the -axis.
The -invariant of is the quantity
Two elliptic curves are isomorphic over the algebraic closure if and only if they have the same -invariant. So is the curve's address: knowing it tells you which isomorphism class you're in. In SIDH, the shared secret turns out to be a -invariant, which is why this invariant matters.
For SIDH, we work over the field , the degree-2 extension of a prime field. Over finite fields, a fundamental structural theorem says that the -torsion subgroup (the points killed by multiplication by , for ) looks like
This two-dimensional structure is essential to how SIDH constructs its commutative square.
Ordinary and supersingular curves
Most elliptic curves over are ordinary: their trace of Frobenius is nonzero mod , and their endomorphism ring is an order in an imaginary quadratic field, which is a commutative ring of rank 2 over .
A curve is supersingular when , which over with is equivalent to and . Equivalently, a supersingular curve has no nontrivial -torsion points over .
An elliptic curve is supersingular if : there are no nontrivial points of -torsion in characteristic . Equivalently, its endomorphism ring is an order in a quaternion algebra over (a noncommutative ring of rank 4 over ), rather than an imaginary quadratic field.
The name is misleading: these are perfectly smooth, nonsingular curves. The word "singular" refers to a classical notion from the theory of complex multiplication and has nothing to do with the curve having singular points.
What matters cryptographically is the quaternionic endomorphism ring. For ordinary curves, is commutative: the isogeny problem naturally admits group-action structure, and group-action problems are vulnerable to quantum hidden-shift attacks (Kuperberg's algorithm). For supersingular curves, is noncommutative, and the isogeny problem in this noncommutative setting is believed to be exponentially hard even for quantum computers. There is no known analog of Kuperberg's algorithm that exploits noncommutative structure.
There are roughly supersingular -invariants in . They are rare, but they are the entire vertex set of the graph that SIDH walks.
Isogenies: maps between curves
An isogeny is a nonconstant rational map of projective varieties that is also a group homomorphism. Because of elliptic curve structure, any nonconstant morphism automatically sends the identity to the identity, so "nonconstant morphism" and "isogeny" coincide. An isogeny carries three pieces of data:
- Its kernel , a finite subgroup.
- Its degree : for separable isogenies, this equals .
- The fact that the kernel determines the isogeny up to isomorphism: given any finite subgroup , there is a unique-up-to-isomorphism isogeny with kernel .
An isogeny between elliptic curves is a nonconstant morphism that is also a group homomorphism. It is to elliptic curves what a group homomorphism is to groups, but with extra geometric structure: it is an algebraic map of varieties, defined by rational functions, and its kernel is always a finite subgroup of .
Vélu's formulas (Vélu 1971) give an explicit construction: given and a cyclic kernel of odd prime order , the codomain curve has coefficients
where are explicit polynomials in the coordinates of . The naive cost is field operations. In practice, SIDH computes large isogenies of degree or as chains of small steps: degree-2 isogenies in sequence.
The supersingular isogeny graph
Fix a prime and a small prime . The supersingular -isogeny graph over is:
- Vertices: the supersingular -invariants in , of which there are .
- Edges: -isogenies between curves (up to post-composition with isomorphism). Because , each vertex has exactly outgoing edges — one for each of the cyclic subgroups of .
The graph is -regular, and it is connected: every pair of supersingular curves over is connected by a chain of -isogenies.
For any prime , the supersingular -isogeny graph is a Ramanujan graph: every non-trivial eigenvalue of its adjacency matrix satisfies
This matches the Alon-Boppana lower bound for -regular graphs, making an asymptotically optimal expander.
The Ramanujan property means random walks on this graph mix in steps: they reach the uniform distribution over all supersingular curves very quickly, with no shortcuts. This is the mathematical fact that makes the graph useful for cryptography. If Alice walks steps from to , and , the endpoint "looks like" a random supersingular curve. An adversary who sees and faces the problem of finding the walk, and the Ramanujan property gives a formal sense in which this is hard.
This expander property was first exploited cryptographically by Charles, Goren, and Lauter in 2006 to construct a hash function: hash by walking the graph, use the final -invariant as the hash value. SIDH, proposed by Jao and De Feo in 2011, was the next step: use the walk as a Diffie-Hellman analog.
The SIDH protocol
Setting up
SIDH uses two small primes and (in the SIKE implementation: , ) and requires a prime of the form
for large exponents and a small cofactor . For SIKE-p434 (the NIST Level 1 parameter set), this is , a 434-bit prime.
Why this ugly prime shape? It forces the starting curve over to have order . That means both and are subgroups living entirely inside , so Alice and Bob can work with explicit generators without going to larger extension fields.
Fix public bases: generating and generating . These are public parameters.
The exchange
Alice picks a secret integer . She forms the subgroup , computes the corresponding isogeny via a chain of degree- Vélu steps, and publishes:
That is: her codomain curve, plus the images of Bob's torsion basis under her secret isogeny.
Bob symmetrically picks , computes with kernel , and publishes:
The key exchange: Alice uses Bob's published data to compute with kernel
Bob computes with kernel . The diagram commutes:
Both parties arrive at curves isomorphic to , so both can compute the same , a field element in that serves as the shared secret. This is the analog of in classical Diffie-Hellman: Alice's secret acts on Bob's curve, Bob's secret acts on Alice's curve, and the commutativity of the diagram guarantees they meet at the same place.
SIKE
SIKE wrapped SIDH in an IND-CCA Key Encapsulation Mechanism using a Hofheinz-Hövelmanns-Kiltz-style transform. It was a NIST PQC submission from Round 1 in 2017 through Round 4 in 2022. The public keys were small: 330 bytes uncompressed, 197 bytes with compression, at NIST Level 1. ML-KEM-512 uses 800-byte public keys.
Notice the asymmetry in what Alice publishes. She sends her codomain curve along with and , the images of Bob's torsion basis under her secret isogeny. This is what makes the commutative square work: Alice needs these to evaluate starting from rather than . It is also, as we will see, what makes the protocol breakable.
Most other isogeny-based systems (the CGL hash function, CSIDH, SQIsign) reveal only the codomain curve. SIDH reveals more. It hands the adversary the action of Alice's secret transformation on a known basis. For a decade, no one knew how to weaponize that. Then Castryck and Decru did.
The unease
The torsion-image publication had made some cryptographers uncomfortable for years. In 2017, Petit showed that revealing additional torsion-point information could enable attacks, but only on deliberately unbalanced parameter sets where or vice versa. SIKE's balanced parameters seemed to escape this. The community's working conclusion was that the structural information leak was present but manageable, and that the protocol's other attractive properties outweighed the theoretical unease.
That comfort lasted five more years.
Kani's lemma: the 1997 paper that waited 25 years
In 1997, Ernst Kani published a paper in Journal für die reine und angewandte Mathematik titled "The number of curves of genus two with elliptic differentials." It was pure algebraic geometry. The paper counted certain arithmetic objects and proved a structural criterion about when a map between products of elliptic curves decomposes into a product of maps between individual curves.
The key object is an isogeny between abelian surfaces: 2-dimensional abelian varieties, which arise naturally as products of two elliptic curves. Given four elliptic curves and isogenies forming a "diamond":
of degree , Kani's theorem characterizes exactly when is reducible, meaning its kernel decomposes as a product of subgroups of and rather than being "mixed" in a way that produces a Jacobian of a genus-2 curve.
Given elliptic curves and an isogeny of degree arising from a "diamond" of isogenies, is reducible (its codomain is a product of elliptic curves, not a Jacobian of a genus-2 curve) if and only if a specific torsion anti-isometry condition holds between the corner isogenies. When is reducible, its kernel can be read off explicitly, giving the component isogenies and .
The punchline for cryptography: if you can engineer a situation where Kani's criterion applies and gives reducibility, you can read off an isogeny you weren't supposed to know.
The Castryck-Decru attack
Castryck and Decru's insight was that SIDH's published torsion-point images were exactly the data needed to set up Kani's theorem, and the prime form was exactly the structure needed to make the reducibility condition hold.
Here is the high-level construction (Castryck-Decru 2022).
Step 1: Find an auxiliary isogeny. The starting curve has -invariant 1728 and complex multiplication by . So it has a small-degree endomorphism: where in . This endomorphism is the "auxiliary curve" the attack needs, a structural feature of SIKE's specific parameter set.
Step 2: Build the abelian surface map. Using the auxiliary endomorphism and the public torsion images , construct an isogeny
of degree , whose kernel is determined by the published data. The SIKE prime form guarantees that has the right shape to satisfy Kani's reducibility criterion.
Step 3: Execute the chain. Compute as a sequence of -isogenies on the abelian surface (Richelot isogenies, a construction from 19th-century algebraic geometry). Each step is concrete linear algebra on Mumford coordinates; the chain has length .
Step 4: Read off the secret. The reducible decomposition of the codomain reveals the component , which encodes directly. Recover Alice's secret without any search.
The original SageMath implementation ran in about ten minutes for SIKE-p434 on a laptop. A public reproduction by Giacomo Pope took roughly 62 minutes on a single core of a 2013 Intel Xeon E5-2630v2. Microsoft paid out the $50,000 SIKE bounty to the authors. The bounty system worked exactly as intended.
- July 5, 2022: NIST announces Kyber, Dilithium, FALCON, SPHINCS+ for standardization; SIKE moves to Round 4 as a continued candidate.
- July 30, 2022: Castryck-Decru post to ePrint (2022/975).
- August 5, 2022: SIKE-p434 broken in ~62 minutes on a single 2013-vintage Xeon core.
- August 8, 2022: Maino-Martindale post (2022/1026) extending the attack to arbitrary starting curves — not just SIKE's .
- August 10, 2022: Damien Robert posts a polynomial-time break (2022/1038) using higher-dimensional abelian varieties (dimension 4, then 8).
- September 15, 2022: SIKE team publishes final spec acknowledging the break; SIKE is withdrawn.
Maino and Martindale's follow-up matters because it kills the "just use a different starting curve" response. Castryck-Decru's original attack relied on the specific endomorphism available at . Maino and Martindale found a way to construct the necessary auxiliary structure for any supersingular starting curve, removing that dependency.
Robert's polynomial-time result is more decisive. In dimension , you can construct endomorphism matrices of degree , and Lagrange's four-square theorem guarantees every positive integer is a sum of four squares. So in dimension , the norm equation Castryck-Decru had to solve for specific SIKE primes always has a solution; no special structure on is required. The dimension-8 variant makes the algorithm polynomial-time and deterministic. SIDH is broken unconditionally, for any prime and any starting curve.
What was actually broken
The Castryck-Decru attack did not break the supersingular isogeny problem in general (the problem of finding an isogeny between two given supersingular curves). That problem is still believed to be exponentially hard classically and quantumly.
What it broke was the SIDH protocol, specifically the decision to publish torsion-point images. The images and are not needed for the underlying hardness claim. They exist only to make the commutative square work without Alice and Bob sharing a common starting basis. That engineering convenience turned out to be a catastrophic information leak.
You cannot fix SIDH by choosing larger parameters. The attack runs in time polynomial in , so bigger primes make it negligibly slower. The flaw is in the protocol's information structure, not in the size of any quantity. This is qualitatively different from, say, a key-size attack.
The timeline is worth pausing on. SIDH was proposed in 2011. The Kani lemma dates to 1997. For fourteen years, the connection between a 1997 paper on genus-2 curves and a 2011 cryptographic protocol went unnoticed. The attack does not brute-force anything. It reframes the problem geometrically, notices that the published data is exactly sufficient to invoke a classical algebraic result, and reads off the secret as a consequence.
What survives
The break killed SIKE but not the isogeny research program. Several directions remain active.
CSIDH
CSIDH (pronounced "sea-side," Castryck-Lange-Martindale-Panny-Renes 2018) is a different protocol that was never affected by Castryck-Decru. Where SIDH works over and uses the full supersingular isogeny graph, CSIDH works with supersingular curves defined over and uses the action of the ideal class group of the imaginary-quadratic order . The protocol never publishes torsion-point images; the only public data is the codomain curve.
CSIDH has its own problems. Its class-group action is commutative, which means Kuperberg's quantum hidden-shift algorithm applies and a quantum adversary can solve the relevant problem in subexponential time. Achieving genuinely post-quantum security at NIST Level 1 likely requires CSIDH primes of 2500-5000 bits, which loses the compact-key advantage that made isogeny schemes attractive in the first place. CSIDH is not a NIST candidate but remains an active research topic.
Masked variants: M-SIDH and MD-SIDH
Fouotsa, Moriya, and Petit (2023) proposed masking the torsion images: Alice publishes and for a secret scalar satisfying . Without the exact images, the attacker cannot set up the Kani construction. MD-SIDH additionally masks the degree of the secret isogeny.
The cost is severe. M-SIDH public keys for NIST Level 1 are roughly 4,434 bytes, versus 330 bytes for original SIKE-p434. That's a 13x blowup, and subsequent cryptanalysis has continued chipping away at the parameter sets. M-SIDH is not currently on a standardization track.
FESTA
Basso, Maino, and Pope (2023) took a different approach: invert the Castryck-Decru attack and use the dimension-2 isogeny trick as a trapdoor for public-key encryption. In FESTA, decryption is literally "run the SIDH attack on a structured input." The attack becomes the feature. FESTA is IND-CCA secure in the quantum random oracle model, but it is research-stage and not on any standardization track.
SQIsign
SQIsign (De Feo, Kohel, Leroux, Petit, Wesolowski, ASIACRYPT 2020) is the surviving isogeny scheme on a standardization path. It is a signature scheme, not a KEM, and it was unaffected by Castryck-Decru from the start: SQIsign never publishes torsion-point images.
SQIsign's security rests on the Endomorphism Ring Problem (ERP): given a supersingular curve , compute as a maximal order in the quaternion algebra . Wesolowski showed that ERP is equivalent to the general supersingular isogeny problem, so breaking SQIsign is as hard as the isogeny problem itself, the same abstract problem that SIDH claimed to reduce to but, via the torsion images, actually didn't.
SQIsign's computational engine is the Deuring correspondence:
and more finely, isogenies between curves correspond to left ideals connecting the relevant maximal orders. The prover in SQIsign does most of its work as quaternion ideal arithmetic (concrete linear algebra over -modules of rank 4) and translates back to elliptic curves only at the end.
NIST selected SQIsign as one of 14 Round-2 signature on-ramp candidates in October 2024 (announcement). Round-2 spec: sqisign.org. Performance on Intel Core i7-13700K at NIST Level 1: signing ~30 ms, verification ~1.5 ms. Signature size: ~177 bytes; public key: ~64 bytes. Signing is slow (an order of magnitude slower than ML-DSA) but the keys and signatures are tiny, beating RSA-2048.
The cost is signing speed and algorithmic complexity. SQIsign's signing path involves Eichler orders, KLPT-style ideal-to-isogeny translation, and a response computation that requires finding a smooth-norm ideal in a noncommutative order. A complete security proof appeared only in 2024-2025. It is not a drop-in replacement for anything, but it is the only isogeny-based scheme with a realistic path to standardization.
What cryptographic agility actually demands
The post-quantum situation after SIKE's fall is not a crisis. ML-KEM works, ML-DSA works, and HQC (selected as a backup KEM in March 2025) provides code-based diversity. The lattice assumptions underlying ML-KEM and ML-DSA have been studied for twenty years, and there is no current threat to them.
The SIKE story is still a useful stress test for the diversity argument. SIKE's break was total and structural, not incremental. The scheme was not weakened; it was eliminated. If SIKE had been the only post-quantum KEM in NIST's portfolio rather than an alternate alongside Kyber, BIKE, HQC, and Classic McEliece, the 2022 break would have been much more disruptive. As it happened, it was a shock to the isogeny community and not a crisis for post-quantum cryptography as a field.
The more durable lesson is about information leakage in protocol design. SIDH's designers needed Alice and Bob to construct each other's isogenies on each other's curves. The solution they found, publishing the torsion images, was elegant and made the mathematics work out cleanly. For a decade it looked like a reasonable design choice that happened to leak a little extra structure. Castryck and Decru showed that "a little extra structure" can be a complete key recovery when the right classical mathematics is brought to bear.
The principle for protocol designers: every bit you publish beyond what is strictly necessary for correctness is a bit an attacker might weaponize. That isn't a new principle; minimal disclosure has always been foundational to good cryptographic design. SIDH is a reminder of how long an information-theoretic surplus can sit harmlessly in a protocol before someone figures out what to do with it.
The supersingular isogeny graph is still a beautiful mathematical object. The Ramanujan property, the Deuring correspondence, the connection to modular forms and quaternion algebras: none of that disappeared when SIKE was withdrawn. SQIsign is built on the same graph and the same deep algebraic structure, but it releases only what correctness requires. The math goes on. The protocol that leaked too much doesn't.
References: Jao-De Feo (2011); Castryck-Decru (2022); Maino et al. (2022); Robert (2022); M-SIDH (2023); FESTA (2023); CSIDH (2018); SQIsign (2020); Kani (1997); Silverman, Arithmetic of Elliptic Curves.