A Practical Attack on a Certain Braid Group Based Shifted Conjugacy Authentication Protocol
نویسندگان
چکیده
In recent years, Artin’s braid groups have undergone intense scrutiny as a possible cryptographic platform, due mainly to the key-exchange protocols proposed in [1] and [12]. The security of both of these protocols relies on the difficulty of variants of the conjugacy search problem in braid groups, a well-studied problem (see [9], [6], [10]). More recently, Dehornoy has proposed a zero-knowledge authentication protocol based on group operations satisfying the left self-distributivity law [5]. Conjugacy is an example of a left self-distributive operation. Another example is the so-called shifted conjugacy operation of braids. This operation and its properties form the main object of study in this paper.
منابع مشابه
Cryptanalysis of shifted conjugacy authentication protocol
In this paper we present the first practical attack on the shifted conjugacy-based authentication protocol proposed by P. Dehornoy in [5]. We discuss the weaknesses of that primitive and propose ways to improve the protocol.
متن کاملMean-set attack: cryptanalysis of Sibert et al. authentication protocol
We analyze the Sibert et al. group-based (Feige-Fiat-Shamir type) authentication protocol and show that the protocol is not computationally zero-knowledge. In addition, we provide experimental evidence that our approach is practical and can succeed even for groups with no efficiently computable length function such as braid groups. The novelty of this work is that we are not attacking the proto...
متن کاملUsing shifted conjugacy in braid-based cryptography
Conjugacy is not the only possible primitive for designing braidbased protocols. To illustrate this principle, we describe a Fiat{Shamir-style authentication protocol that be can be implemented using any binary operation that satis es the left self-distributive law. Conjugation is an example of such an operation, but there are other examples, in particular the shifted conjugation on Artin’s bra...
متن کاملA Practical Attack on a Braid Group Based Cryptographic Protocol
In this paper we present a practical heuristic attack on the Ko, Lee et al. key exchange protocol introduced at Crypto 2000 [10]. One of the ideas behind our attack is using Dehornoy’s handle reduction method as a counter measure to diffusion provided by the Garside normal form, and as a tool for simplifying braid words. Another idea employed in our attack is solving the decomposition problem i...
متن کاملA Note on the Shifted Conjugacy Problem in Braid Groups
It is an open problem whether the shifted conjugacy (decision) problem in B∞ is solvable. We settle this problem by reduction to an instance of the simultaneous conjugacy problem in Bn for some n ∈ N. Recall Artin's presentation of the braid group Bn with n ≥ 2 strands [1]: Bn = 〈σ1, . . . , σn−1 | σiσj = σjσi for |i−j| ≥ 2, σiσjσi = σjσiσj for |i−j| = 1〉. The groups Bn (n ≥ 2) build an inducti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Groups Complexity Cryptology
دوره 1 شماره
صفحات -
تاریخ انتشار 2009