The Supersingular Isogeny Diffie-Hellman (SIDH) protocol is a leading contender for post-quantum cryptography. However, recent advances, specifically the Castryck-Decru attack, have exposed significant security flaws, primarily related to the predictability of torsion points and vulnerabilities in curve parameters. This study proposes and evaluates enhancements to the SIDH protocol, including increasing the size of torsion subgroups, introducing randomized isogeny generation , and employing advanced obfuscation techniques. Experimental results demonstrate that these modifications substantially improve SIDH’s security, with a manageable increase in computational overhead, positioning SIDH as a more resilient candidate for post-quantum cryptographic applications.