A Practical Attack on a Certain Braid Group Based Shifted Conjugacy Authentication Protocol

نویسندگان

  • Jonathan Longrigg
  • Alexander Ushakov
چکیده

In recent years, Artin’s braid groups have undergone intense scrutiny as a possible cryptographic platform, due mainly to the key-exchange protocols proposed in [1] and [12]. The security of both of these protocols relies on the difficulty of variants of the conjugacy search problem in braid groups, a well-studied problem (see [9], [6], [10]). More recently, Dehornoy has proposed a zero-knowledge authentication protocol based on group operations satisfying the left self-distributivity law [5]. Conjugacy is an example of a left self-distributive operation. Another example is the so-called shifted conjugacy operation of braids. This operation and its properties form the main object of study in this paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of shifted conjugacy authentication protocol

In this paper we present the first practical attack on the shifted conjugacy-based authentication protocol proposed by P. Dehornoy in [5]. We discuss the weaknesses of that primitive and propose ways to improve the protocol.

متن کامل

Mean-set attack: cryptanalysis of Sibert et al. authentication protocol

We analyze the Sibert et al. group-based (Feige-Fiat-Shamir type) authentication protocol and show that the protocol is not computationally zero-knowledge. In addition, we provide experimental evidence that our approach is practical and can succeed even for groups with no efficiently computable length function such as braid groups. The novelty of this work is that we are not attacking the proto...

متن کامل

Using shifted conjugacy in braid-based cryptography

Conjugacy is not the only possible primitive for designing braidbased protocols. To illustrate this principle, we describe a Fiat{Shamir-style authentication protocol that be can be implemented using any binary operation that satis es the left self-distributive law. Conjugation is an example of such an operation, but there are other examples, in particular the shifted conjugation on Artin’s bra...

متن کامل

A Practical Attack on a Braid Group Based Cryptographic Protocol

In this paper we present a practical heuristic attack on the Ko, Lee et al. key exchange protocol introduced at Crypto 2000 [10]. One of the ideas behind our attack is using Dehornoy’s handle reduction method as a counter measure to diffusion provided by the Garside normal form, and as a tool for simplifying braid words. Another idea employed in our attack is solving the decomposition problem i...

متن کامل

A Note on the Shifted Conjugacy Problem in Braid Groups

It is an open problem whether the shifted conjugacy (decision) problem in B∞ is solvable. We settle this problem by reduction to an instance of the simultaneous conjugacy problem in Bn for some n ∈ N. Recall Artin's presentation of the braid group Bn with n ≥ 2 strands [1]: Bn = 〈σ1, . . . , σn−1 | σiσj = σjσi for |i−j| ≥ 2, σiσjσi = σjσiσj for |i−j| = 1〉. The groups Bn (n ≥ 2) build an inducti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Groups Complexity Cryptology

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2009