Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings

05/17/2021
by   Christopher Battarbee, et al.
0

It was recently demonstrated that the Matrix Action Key Exchange (MAKE) algorithm, a new type of key exchange protocol using the semidirect product of matrix groups, is vulnerable to a linear algebraic attack if the matrices are over a commutative ring. In this note, we establish conditions under which protocols using matrices over a non-commutative ring are also vulnerable to this attack. We then demonstrate that group rings R[G] used in arXiv:1304.6572, where R is a commutative ring and G is a non-abelian group, are examples of non-commutative rings that satisfy these conditions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/01/2020

MAKE: a Matrix Action Key Exchange

We offer a public key exchange protocol based on a semidirect product of...
research
04/16/2019

Fast Commutative Matrix Algorithm

We show that the product of an nx3 matrix and a 3x3 matrix over a commut...
research
10/06/2018

Cryptanalysis of the DHDP and EGDP protocols over E_p^(m)

In this paper we break the protocol based on the Diffie-Hellman Decompos...
research
07/22/2022

Cryptanalysis of a System based on Twisted Dihedral Group Algebras

Several cryptographic protocols constructed based on less-known algorith...
research
03/05/2021

Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical

We introduce the first microarchitectural side channel attacks that leve...
research
02/24/2020

Commutator subgroups of Sylow 2-subgroups of alternating group and Miller-Moreno groups as bases of new Key Exchange Protocol

The goal of this investigation is effective method of key exchange which...
research
01/13/2020

Wyner-Ziv reconciliation for key exchange based on Ring-LWE

We consider a key encapsulation mechanism (KEM) based on ring-LWE where ...

Please sign up or login with your details

Forgot password? Click here to reset