Abstract
At CRYPTO 2000, a new public-key encryption based on braid groups was introduced. This paper demonstrates how to solve its underlying problem using the Burau representation. By this method, we show that the private-key can be recovered from the public-key for several parameters with significant probability in a reasonable time. Our attack can be mounted directly on the revised scheme mentioned at ASIACRYPT 2001 as well. On the other hand, we give a new requirement for secure parameters against our attack, which more or less conflicts with that against brute force attack.
Chapter PDF
References
I. Anshel, M. Anshel, B. Fisher, and D. Goldfeld, New Key Agreement Protocols in Braid Group Cryptography. Topics in Cryptology — CT-RSA 2001, Lecture Notes in Computer Science 2020, Springer-Verlag, pp. 13–27, 2001.
I. Anshel, M. Anshel, and D. Goldfeld, An algebraic method for public-key cryptography. Mathematical Research Letters 6, pp. 287–291, 1999.
J.C. Cha, K.H. Ko, S.J. Lee, J.W. Han, and J.H. Cheon, An Efficient Implementation of Braid Groups. Advances in Cryptology — ASIACRYPT 2001, Lecture Notes in Computer Science 2248, Springer-Verlag, pp. 144–156, 2001.
T.H. Cormen, C.E. Leiserson, R.L. Rivest, C. Stein, Introduction to Algorithms, 2nd Edition, The MIT Press, 2001.
R. Gennaro and D. Micciancio, Cryptanalysis of a pseudorandom generator based on braid groups. Advances in Cryptology — EUROCRYPT 2002, Lecture Notes in Computer Science 2332, Springer-Verlag, pp. 1–13, 2002.
S.G. Hahn, E. Lee, and J.H. Park, Complexity of the Generalized Conjugacy Problem. To appear in Discrete Applied Mathematics. Available at http://crypt.kaist.ac.kr/pre_papers/DA5640.ps.
J. Hoffstein, J. Pipher, and J.H. Silverman, NTRU: a Ring based Publick Key Cryptosystem. Algorithmic Number Theory Symposium — ANTS III, Lecture Notes in Computer Science 1423, Springer-Verlag, pp. 267–288, 1999.
D. Hofheinz and R. Steinwandt, A Practical Attack on Some Braid Group Based Cryptographic Primitives, Public Key Cryptography — PKC 2003, Lecture Notes in Computer Science 2567, Springer-Verlag, pp. 187–198, 2003.
J. Hughes, A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem. 7th Australasian Conference of Information Security and Privacy — ACISP 2002, Lecture Notes in Computer Science 2384, Springer-Verlag, pp. 176–189, 2002.
J. Hughes and A. Tannenbaum, Length-Based Attacks for Certain Group Based Encryption Rewriting Systems, Workshop SECI02 SÉcurité de la Communication sur Intenet, September, 2002. Available at http://www.network.com/hughes/SECI02.pdf.
K.H. Ko, S.J. Lee, J.H. Cheon, J.W. Han, J.S. Kang, and C. Park, New Publickey Cryptosystem Using Braid Groups. Advances in Cryptology — Crypto 2000, Lecture Notes in Computer Science 1880, Springer-Verlag, pp. 166–183, 2000.
E. Lee, S.J. Lee, and S.G. Hahn, Pseudorandomness from Braid Groups. Advances in Cryptology-CRYPTO 2001, Lecture Notes in Computer Science 2139, Springer-Verlag, pp. 486–502, 2001.
S. J. Lee and E. Lee, Potential Weaknesses of the Commutator Key Agreement Protocol based on Braid Groups. Advances in Cryptology — EUROCRYPT 2002, Lecture Notes in Computer Science 2332, Springer-Verlag, pp. 14–28, 2002.
P.Q. Nguyen and D. Pointcheval, Analysis and Improvements of NTRU Encryption Paddings. Advances in Cryptology — CRYPTO 2002, Lecture Notes in Computer Science 2442, Springer-Verlag, pp. 210–215, 2002.
S.H. Paeng, K.C. Ha, J.H. Kim, S. Chee, and C. Park, New Public Key Cryptosystem Using Finite Non Abelian Groups. Advances in Cryptology — CRYPTO 2001, Lecture Notes in Computer Science 2139, Springer-Verlag, pp. 470–485, 2001.
P.W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal of Computing 26, pp. 1484–1509, 1997.
V. Wheatman and L. McRory, Quantum Computers: The End of Public-Key Cryptography? Gartner research note, January 2002.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 International Association for Cryptologic Research
About this paper
Cite this paper
Lee, E., Park, J.H. (2003). Cryptanalysis of the Public-Key Encryption Based on Braid Groups. In: Biham, E. (eds) Advances in Cryptology — EUROCRYPT 2003. EUROCRYPT 2003. Lecture Notes in Computer Science, vol 2656. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39200-9_30
Download citation
DOI: https://doi.org/10.1007/3-540-39200-9_30
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-14039-9
Online ISBN: 978-3-540-39200-2
eBook Packages: Springer Book Archive