Attack on Kayawood protocol: Uncloaking private keys

Matvei Kotov, Anton Menshov, Alexander Ushakov

Research output: Contribution to journalArticlepeer-review

Abstract

We analyze security properties of a two-party key-agreement protocol recently proposed by I. Anshel, D. Atkins, D. Goldfeld, and P. Gunnels, called Kayawood protocol. At the core of the protocol is an action (called E-multiplication) of a braid group on some finite set. The protocol assigns a secret element of a braid group to each party (private key). To disguise those elements, the protocol uses a so-called cloaking method that multiplies private keys on the left and on the right by specially designed elements (stabilizers for E-multiplication). We present a heuristic algorithm that allows a passive eavesdropper to recover Alice’s private key by removing cloaking elements. Our attack has 100% success rate on randomly generated instances of the protocol for the originally proposed parameter values and for recent proposals that suggest to insert many cloaking elements at random positions of the private key. Implementation of the attack is available on GitHub.

Original languageEnglish
Pages (from-to)237-249
Number of pages13
JournalJournal of Mathematical Cryptology
Volume15
Issue number1
DOIs
StatePublished - 1 Jan 2021

Keywords

  • Algebraic eraser
  • Braid group
  • Cloaking problem
  • Colored Burau presentation
  • E-multiplication
  • Group-based cryptography
  • Kayawood protocol
  • Key agreement

Fingerprint

Dive into the research topics of 'Attack on Kayawood protocol: Uncloaking private keys'. Together they form a unique fingerprint.

Cite this