Cryptanalysis of a key exchange protocol based on the endomorphisms ring End$${(\mathbb{Z}_{p} \times \mathbb{Z}_{p^2})}$$

Climent et al. (Appl Algebra Eng Commun Comput 22:91–108, 2011) identified the elements of the endomorphisms ring End$${(\mathbb{Z}_p \times \mathbb{Z}_{p^2})}$$ with elements in a set, Ep, of matrices of size 2 × 2, whose elements in the first row belong to $${\mathbb{Z}_{p}}$$ and the elements in the second row belong to $${\mathbb{Z}_{p^2}}$$. By taking advantage of matrix arithmetic, they proposed a key exchange protocol using polynomial functions over Ep defined by polynomials in $${\mathbb{Z}[X]}$$. In this note, we show that this protocol is insecure; it can be broken by solving a set of 10 consistent homogeneous linear equations in 8 unknowns over $${\mathbb{Z}_{p^2}}$$.

[1]  Vladimir Shpilrain Cryptanalysis of Stickel's Key Exchange Scheme , 2008, CSR.

[2]  G. Bergman Some examples in PI ring theory , 1974 .

[3]  Joan-Josep Climent,et al.  On the arithmetic of the endomorphisms ring $${{\rm End}(\mathbb{Z}_{p} \times \mathbb{Z}_{p^{2}})}$$ , 2011, Applicable Algebra in Engineering, Communication and Computing.

[4]  Ciaran Mullan,et al.  Some Results in Group-Based Cryptography , 2011 .

[5]  Arkadius G. Kalka Representation Attacks on the Braid Diffie-Hellman Public Key Encryption , 2006, Applicable Algebra in Engineering, Communication and Computing.

[6]  A. Myasnikov,et al.  Non-Commutative Cryptography and Complexity of Group-Theoretic Problems , 2011 .

[7]  Jung Hee Cheon,et al.  A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem , 2003, CRYPTO.

[8]  Eberhard Stickel,et al.  A New Method for Exchanging Secret Keys , 2005, Third International Conference on Information Technology and Applications (ICITA'05).

[9]  Joan-Josep Climent,et al.  On the arithmetic of the endomorphisms ring End(\mathbb Z p ×\mathbb Z p 2 ). , 2011 .

[10]  Jung Hee Cheon,et al.  An Efficient Implementation of Braid Groups , 2001, ASIACRYPT.

[11]  Jung Hee Cheon,et al.  New Public-Key Cryptosystem Using Braid Groups , 2000, CRYPTO.

[12]  James Hughes,et al.  A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem , 2002, ACISP.

[13]  Ciaran Mullan Cryptanalysing variants of Stickel's key agreement scheme , 2011, J. Math. Cryptol..

[14]  Pedro R. Navarro,et al.  On the arithmetic of the endomorphisms ring , 2012 .

[15]  Eonkyung Lee,et al.  Cryptanalysis of the Public-Key Encryption Based on Braid Groups , 2003, EUROCRYPT.