Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1760564.1760571guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Cryptanalysis of group-based key agreement protocols using subgroup distance functions

Published: 16 April 2007 Publication History

Abstract

We introduce a new approach for cryptanalysis of key agreement protocols based on noncommutative groups. Our approach uses functions that estimate the distance of a group element to a given subgroup. We test it against the Shpilrain-Ushakov protocol, which is based on Thompson's group F, and show that it can break about half the keys within a few seconds on a single PC.

References

[1]
I. Anshel, M. Anshel and D. Goldfeld, An algebraic method for public-key cryptography, Mathematical Research Letters 6 (1999), 287-291.
[2]
E. Artin, Theory of Braids, Annals of Mathematics 48 (1947), 127-136.
[3]
J.W. Cannon, W.J. Floyd and W.R. Parry, Introductory notes on Richard Thompson's groups, L'Enseignement Mathematique (2) 42 (1996), 215-256.
[4]
D. Garber, S. Kaplan, M. Teicher, B. Tsaban, and U. Vishne, Length-based conjugacy search in the Braid group, Contemporary Mathematics 418 (2006), 75-87.
[5]
D. Garber, S. Kaplan, M. Teicher, B. Tsaban, and U. Vishne, Probabilistic solutions of equations in the braid group, Advances in Applied Mathematics 35 (2005), 323- 334.
[6]
J. Hughes and A. Tannenbaum, Length-based attacks for certain group based encryption rewriting systems, Workshop SECI02 Sécurité de la Communication sur Internet (2002).
[7]
K.H. Ko, S.J. Lee, J.H. Cheon, J.W. Han, J. Kang and C. Park, New Public-Key Cryptosystem Using Braid Groups, Lecture Notes in Computer Science 1880 (2000), 166-183.
[8]
F. Matucci, The Shpilrain-Ushakov Protocol for Thompson's Group F is always breakable, e-print arxiv.org/math/0607184 (2006).
[9]
D. Ruinskiy, A. Shamir and B. Tsaban, Length-based cryptanalysis: The case of Thompson's group, e-print arxiv.org/cs/0607079 (2006).
[10]
V. Shpilrain, Assessing security of some group based cryptosystems, Contemporary Mathematics 360 (2004), 167-177.
[11]
V. Shpilrain and A. Ushakov, The conjugacy search problem in public key cryptography: unnecessary and insufficient, Applicable Algebra in Engineering, Communication and Computing 17 (2006), 291-302.
[12]
V. Shpilrain and A. Ushakov, Thompson's group and public key cryptography, ACNS 2005, Lecture Notes in Computer Science 3531 (2005), 151-164.

Cited By

View all
  • (2008)Cryptanalysis of Stickel's key exchange schemeProceedings of the 3rd international conference on Computer science: theory and applications10.5555/1813695.1813727(283-288)Online publication date: 7-Jun-2008
  • (2008)An authentication scheme based on the twisted conjugacy problemProceedings of the 6th international conference on Applied cryptography and network security10.5555/1788857.1788879(366-372)Online publication date: 3-Jun-2008

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
PKC'07: Proceedings of the 10th international conference on Practice and theory in public-key cryptography
April 2007
490 pages
ISBN:9783540716761
  • Editors:
  • Tatsuaki Okamoto,
  • Xiaoyun Wang

Sponsors

  • NSF of China: National Natural Science Foundation of China
  • International Association of Cryptologic Research
  • Tsinghua University: Tsinghua University

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 16 April 2007

Author Tags

  1. Shpilrain-Ushakov
  2. Thompson's group
  3. cryptanalysis
  4. key agreement
  5. subgroup distance function

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2008)Cryptanalysis of Stickel's key exchange schemeProceedings of the 3rd international conference on Computer science: theory and applications10.5555/1813695.1813727(283-288)Online publication date: 7-Jun-2008
  • (2008)An authentication scheme based on the twisted conjugacy problemProceedings of the 6th international conference on Applied cryptography and network security10.5555/1788857.1788879(366-372)Online publication date: 3-Jun-2008

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media