Cryptanalysis of Stickel's Key Exchange Scheme

We offer cryptanalysis of a key exchange scheme due to Stickel [11], which was inspired by the well-known Diffie-Hellman protocol. We show that Stickel's choice of platform (the group of invertible matrices over a finite field) makes the scheme vulnerable to linear algebra attacks with very high success rate in recovering the shared secret key (100% in our experiments). We also show that obtaining the shared secret key in Stickel's scheme is not harder for the adversary than solving the decomposition search problem in the platform (semi)group.

[1]  Mihir Bellare Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.

[2]  Alexei G. Myasnikov,et al.  A Practical Attack on a Braid Group Based Cryptographic Protocol , 2005, CRYPTO.

[3]  Victor Shoup Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.

[4]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[5]  Vladimir Shpilrain,et al.  Thompson's Group and Public Key Cryptography , 2005, ACNS.

[6]  Robert R. Alfano,et al.  Recent Advances in the Uses of Light in Physics, Chemistry, Engineering, and Medicine: 19-21 June 1991, the City College of New York , 1992 .

[7]  Byoungcheon Lee,et al.  Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings , 2006, ICISC.

[8]  David Garber,et al.  Probabilistic Solutions of Equations in the Braid Group , 2005, Adv. Appl. Math..

[9]  Vladimir Shpilrain Hashing with Polynomials , 2006, ICISC.

[10]  Adi Shamir,et al.  Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions , 2007, Public Key Cryptography.

[11]  Eberhard Stickel,et al.  A New Method for Exchanging Secret Keys , 2005, Third International Conference on Information Technology and Applications (ICITA'05).

[12]  Jung Hee Cheon,et al.  New Public-Key Cryptosystem Using Braid Groups , 2000, CRYPTO.

[13]  Vladimir Shpilrain,et al.  A new key exchange protocol based on the decomposition problem , 2005, IACR Cryptol. ePrint Arch..