Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

International Workshop on Public Key Cryptography

PKC 2007: Public Key Cryptography – PKC 2007 pp 76–88Cite as

  1. Home
  2. Public Key Cryptography – PKC 2007
  3. Conference paper
Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol

Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol

  • Alex D. Myasnikov1 &
  • Alexander Ushakov1 
  • Conference paper
  • 2141 Accesses

  • 18 Citations

  • 3 Altmetric

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4450)

Abstract

The length based attack on Anshel-Anshel-Goldfeld commutator key-exchange protocol [1] was initially proposed by Hughes and Tannenbaum in [9]. Several attempts have been made to implement the attack [6], but none of them had produced results convincing enough to believe that attack works. In this paper we show that accurately designed length based attack can successfully break a random instance of the simultaneous conjugacy search problem for certain parameter values and argue that the public/private information chosen uniformly random leads to weak keys.

Keywords

  • Braid Group
  • Length Function
  • Conjugacy Problem
  • Geodesic Length
  • Conjugacy Search Problem

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Chapter PDF

Download to read the full chapter text

References

  1. Anshel, I., Anshel, M., Goldfeld, D.: An algebraic method for public-key cryptography. Math. Res. Lett. 6, 287–291 (1999)

    MATH  MathSciNet  Google Scholar 

  2. Birman, J.S.: Braids, links and mapping class groups. Ann. Math. Studies, vol. 82. Princeton Univ. Press, Princeton (1974)

    Google Scholar 

  3. CRyptography And Groups (CRAG), C++ and Python Library for computations in groups and group based cryptography, available at http://www.acc.stevens.edu/downloads.php

  4. Dehornoy, P.: A fast method for comparing braids. Advances in math. 125, 200–235 (1997)

    CrossRef  MATH  MathSciNet  Google Scholar 

  5. Epstein, D.B.A., Cannon, J.W., Holt, D.F., Levy, S.V.F., Paterson, M.S., Thurston, W.P.: Word processing in groups. Jones and Bartlett Publishers, Boston (1992)

    MATH  Google Scholar 

  6. Garber, D., Kaplan, S., Teicher, M., Tsaban, B., Vishne, U.: Length-based conjugacy search in the Braid group. http://arxiv.org/abs/math.GR/0209267

  7. Hofheinz, D., Steinwandt, R.: A Practical Attack on Some Braid Group Based Cryptographic Primitives. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 187–198. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

  8. Hughes, J.: A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 176–189. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

  9. Hughes, J., Tannenbaum, A.: Length-based attacks for certain group based encryption rewriting systems. In: Workshop SECI02 Securitè de la Communication sur Intenet, Tunis, Tunisia, September (2002)

    Google Scholar 

  10. Ko, K.H., Lee, S.J., Cheon, J.H., Han, J.W., Kang, J., Park, C.: New public-key cryptosystem using braid groups. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 166–183. Springer, Heidelberg (2000)

    CrossRef  Google Scholar 

  11. Lee, S.J., Lee, E.: Potential Weaknesses of the Commutator Key Agreement protocol Based on Braid Groups. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 14–28. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

  12. Mihailova, K.A.: The occurrence problem for free products of groups. Math. USSR-Sbornik 70, 241–251 (1966)

    MathSciNet  Google Scholar 

  13. Myasnikov, A.G., Shpilrain, V., Ushakov, A.: A practical attack on some braid group based cryptographic protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 86–96. Springer, Heidelberg (2005)

    Google Scholar 

  14. Myasnikov, A.G., Shpilrain, V., Ushakov, A.: Random subgroups of braid groups: an approach to cryptanalysis of a braid group based cryptographic protocol. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 302–314. Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

  15. Paterson, M., Razborov, A.: The set of minimal braids in co-NP-complete. J. Algorithms 12, 393–408 (1991)

    CrossRef  MATH  MathSciNet  Google Scholar 

  16. Shpilrain, V., Ushakov, A.: The conjugacy search problem in public key cryptography: unnecessary and insufficient, Applicable Algebra in Engineering, Communication and Computing (to appear), http://eprint.iacr.org/2004/321/

  17. Vershik, A., Nechaev, S., Bikbov, R.: Statistical properties of braid groups in locally free approximation. Communications in Mathematical Physics 212, 469–501 (2000)

    CrossRef  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Mathematical Sciences, Stevens Institute of Technology, Hoboken, New Jersey, 07030, USA

    Alex D. Myasnikov & Alexander Ushakov

Authors
  1. Alex D. Myasnikov
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Alexander Ushakov
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Tatsuaki Okamoto Xiaoyun Wang

Rights and permissions

Reprints and Permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Myasnikov, A.D., Ushakov, A. (2007). Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol. In: Okamoto, T., Wang, X. (eds) Public Key Cryptography – PKC 2007. PKC 2007. Lecture Notes in Computer Science, vol 4450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71677-8_6

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-540-71677-8_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71676-1

  • Online ISBN: 978-3-540-71677-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature