Non-abelian key agreement protocols

Similar documents
Introduction to Braid Group Cryptography

On the Legacy of Quantum Computation and Communication to Cryptography

THE CONJUGACY SEARCH PROBLEM IN PUBLIC KEY CRYPTOGRAPHY: UNNECESSARY AND INSUFFICIENT

Cryptanalysis of a key exchange protocol based on the endomorphisms ring End(Z p Z p 2)

AN AUTHENTICATION SCHEME BASED ON THE TWISTED CONJUGACY PROBLEM

Decision and Search in Non-Abelian Cramer-Shoup Public Key Cryptosystem

Length-Based Attacks for Certain Group Based Encryption Rewriting Systems

International Electronic Journal of Pure and Applied Mathematics IEJPAM, Volume 9, No. 1 (2015)

USING DECISION PROBLEMS IN PUBLIC KEY CRYPTOGRAPHY

Thompson s group and public key cryptography

Cryptanalysis of the Algebraic Eraser

Public key exchange using semidirect product of (semi)groups

Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol

Surface Groups Within Baumslag Doubles

WALNUT DIGITAL SIGNATURE ALGORITHM

Using shifted conjugacy in braid-based cryptography

A New Key Exchange Protocol Based on DLP and FP in Centralizer Near-Ring

Using semidirect product of (semi)groups in public key cryptography

Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problems in Group Representation Level

arxiv: v1 [cs.cr] 1 May 2012

Homological Decision Problems for Finitely Generated Groups with Solvable Word Problem

arxiv: v2 [math.gr] 2 Feb 2011

Using semidirect product of (semi)groups in public key cryptography

arxiv: v1 [math.gr] 20 Feb 2018

Lecture 4 Chiu Yuen Koo Nikolai Yakovenko. 1 Summary. 2 Hybrid Encryption. CMSC 858K Advanced Topics in Cryptography February 5, 2004

WHY WORD PROBLEMS ARE HARD

Isogenies in a quantum world

AN OVERVIEW OF BRAID GROUP CRYPTOGRAPHY

Using Decision Problems in Public Key Cryptography

CPSC 467b: Cryptography and Computer Security

A note on doubles of groups

2 THE COMPLEXITY OF TORSION-FREENESS On the other hand, the nite presentation of a group G also does not allow us to determine almost any conceivable

Lecture Notes, Week 6

ON COMBINATORIAL GROUP THEORY. Jean-Camille Birget. combinatorial group theory, that was proposed by Wagner and Magyarik in 1984.

Zero-knowledge authentication schemes from actions on graphs, groups, or rings

Improving the trade-o between storage and communication in broadcast encryption schemes

Applications of Combinatorial Group Theory in Modern Cryptography

TROPICAL CRYPTOGRAPHY II: EXTENSIONS BY HOMOMORPHISMS

CPSC 467: Cryptography and Computer Security

On public-key cryptosystems based on combinatorial group theory

Cryptanalysis of the Anshel-Anshel-Goldfeld-Lemieux Key Agreement Protocol

[6] was based on the quadratic residuosity problem, whilst the second given by Boneh and Franklin [3] was based on the Weil pairing. Originally the ex

Quantum-resistant cryptography

arxiv: v4 [math.gr] 2 Sep 2015

New Public-Key Cryptosystem Using Braid Groups

3. G. Groups, as men, will be known by their actions. - Guillermo Moreno

Algorithms in Braid Groups

Three-manifolds and Baumslag Solitar groups

Bjorn Poonen. Cantrell Lecture 3 University of Georgia March 28, 2008

14 Diffie-Hellman Key Agreement

SURGERY EQUIVALENCE AND FINITE TYPE INVARIANTS FOR HOMOLOGY 3-SPHERES L. FUNAR Abstract. One considers two equivalence relations on 3-manifolds relate

Group-based cryptography

Residual finiteness of infinite amalgamated products of cyclic groups

LECTURE 5: APPLICATIONS TO CRYPTOGRAPHY AND COMPUTATIONS

Lifting to non-integral idempotents

A SIMPLE GENERALIZATION OF THE ELGAMAL CRYPTOSYSTEM TO NON-ABELIAN GROUPS

ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks

SYMMETRIC PRESENTATIONS AND ORTHOGONAL GROUPS C.M. Campbell, George Havas, S.A. Linton and E.F. Robertson Abstract In this paper we examine series of

DETERMINING THE HURWITZ ORBIT OF THE STANDARD GENERATORS OF A BRAID GROUP

Group Theory. 1. Show that Φ maps a conjugacy class of G into a conjugacy class of G.

Some generalizations of one-relator groups

SOLVABLE GROUPS OF EXPONENTIAL GROWTH AND HNN EXTENSIONS. Roger C. Alperin

1 Number Theory Basics

Constructions in public-key cryptography over matrix groups

On Linear and Residual Properties of Graph Products

CPSC 467b: Cryptography and Computer Security

POST QUANTUM GROUP THEORETIC CRYPTOGRAPHY

CPSC 467b: Cryptography and Computer Security

Cryptanalysis via algebraic spans

Mirror Reflections on Braids and the Higher Homotopy Groups of the 2-sphere

PUBLIC KEY EXCHANGE USING MATRICES OVER GROUP RINGS

The only method currently known for inverting nf-exp requires computing shortest vectors in lattices whose dimension is the degree of the number eld.

Intro to Public Key Cryptography Diffie & Hellman Key Exchange

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

An Implementation of Ecient Pseudo-Random Functions. Michael Langberg. March 25, Abstract

INTRODUCTION TO COMMUTATIVE ALGEBRA MAT6608. References

On the linearity of HNN-extensions with abelian base groups

ON THE GROUP &[X] OF HOMOTOPY EQUIVALENCE MAPS BY WEISHU SHIH 1. Communicated by Deane Montgomery, November 13, 1963

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Model theory and algebraic geometry in groups, non-standard actions and algorithms

On the classication of algebras

ON THE ISOMORPHISM CONJECTURE FOR GROUPS ACTING ON TREES

An arithmetic theorem related to groups of bounded nilpotency class

Braid groups, their applications and connections

2 g g Figure. f and f We start with two equivalent presentations that dene F and give a reference for the equivalence. We then give a standard embeddi

A Dierential Power Analysis attack against the Miller's Algorithm

On some properties of elementary derivations in dimension six

A note on continuous behavior homomorphisms

during signature generation the secret key is never reconstructed at a single location. To provide fault tolerance, one slightly modies the above tech

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

1 Introduction A general problem that arises in dierent areas of computer science is the following combination problem: given two structures or theori

List of topics for the preliminary exam in algebra

On an algebra related to orbit-counting. Peter J. Cameron. Queen Mary and Westeld College. London E1 4NS U.K. Abstract

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Security Proofs for Signature Schemes. Ecole Normale Superieure. 45, rue d'ulm Paris Cedex 05

Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks

A point compression method for elliptic curves defined over GF (2 n )

An Efficient Implementation of Braid Groups

Transcription:

Discrete Applied Mathematics 130 (2003) 3 12 www.elsevier.com/locate/dam Non-abelian key agreement protocols Iris Anshel a, Michael Anshel b, Dorian Goldfeld c a Arithmetica Inc., 31 Peter Lynas Ct, Tenay, NJ 07670, USA b Department of Computer Science, City College of New York, New York, NY 10031, USA c Department of Mathematics, Columbia University, New York, NY 10027, USA Received 13 February 2001; received in revised form 21 November 2001; accepted 7 May 2002 Abstract A key-agreement protocol (KAP) is a multi-party algorithm dened by a sequence of steps specifying the actions required for two or more individuals to each obtain a shared secret. A brief introduction to an axiomatic basis for non-abelian KAPs is presented. The security of these protocols is related to the diculty of solving equations in non-linear algebraic structures. In particular, it is shown that well known hard problems in group theory can be used to generate key agreement protocols. Concrete examples of such KAPs are discussed and the axiomatic method is shown to subsume other braid group KAPs. The paper concludes with a snapshot of methods and examples currently under investigation.? 2003 Elsevier B.V. All rights reserved. Keywords: Public-key cryptography; Key-agreement protocol; Braid group; Conjugacy problem 1. Axiomatics for non-abelian key agreement protocols A protocol is a multi-party algorithm, dened by a sequence of steps, specifying the actions required of two or more individuals in order to achieve a specied objective. A key-agreement protocol (KAP) is a protocol whereby a shared secret becomes available to two or more individuals for further cryptographic applications. A new class of non-abelian key agreement protocols was introduced in [2,3] and further developed in [4]. The security of these protocols is based on the diculty of solving systems of equations over algebraic structures, in particular groups, a well known class of hard problems. Solutions of equations over algebraic structures are generally thought to be very hard and in some cases even provably unsolvable. We review the non-abelian key agreement protocols and later discuss some specic examples. 0166-218X/03/$ - see front matter? 2003 Elsevier B.V. All rights reserved. PII: S0166-218X(02)00585-1

4 I. Anshel et al. / Discrete Applied Mathematics 130 (2003) 3 12 Consider the 5-tuple: (U; V;; 1 ; 2 ); where U and V are feasibly computable monoids, and : U U V; i : U V V (i =1; 2) satisfy the following axioms: Axiom (i): For all x; y 1 ;y 2 U (x; y 1 y 2 )=(x; y 1 ) (x; y 2 ): Axiom (ii): For all x; y U 1 (x; (y; x)) = 2 (y; (x; y)): Axiom (iii): Assume y 1 ;y 2 ;:::;y k U, (x; y 1 );(x; y 2 );:::;(x; y k ) are publicly known for some secret element x U. Then, in general, determining x is not feasible. We now describe the protocol as a sequence of steps. Alice and Bob are each assigned public submonoids, S A ;S B U; respectively. Suppose S A is generated by the elements {s 1 ;:::;s m } and S B is generated by {t 1 ;:::;t n }: Alice begins by secretly choosing an element a S A and publicly announces the list: (a; t 1 );(a; t 2 );:::;(a; t n ): Likewise, Bob secretly chooses an element b S B and publicly announces the list: (b; s 1 );(b; s 2 );:::;(b; s m ): Alice, knowing a as an element in S A, a = i s e(i) i (e(i) are secret)

I. Anshel et al. / Discrete Applied Mathematics 130 (2003) 3 12 5 can compute (b; a)= i (b; s i ) e(i) : Bob, knowing b as an element in S B, b = i can compute t f(i) i (f(i) are secret) (a; b)= i (a; t i ) f(i) : At this point Alice knows a and (b; a). Likewise, Bob knows b and (a; b). They can now both compute the shared secret where = 1 (a; (b; a)) = 2 (b; (a; b)): We now compare the well-known Die Hellman key agreement protocol and the new non-abelian key agreement protocol. Die Hellman KAP Public information: u, C = large class of commuting one-way functions. Alice s: Bob s: Secret key: f C Public key: f(u) Secret key: g C Public key: g(u) Shared secret: f(g(u)). Non-abelian KAP Public information: U; V; ; 1 ; 2 ; S A ;S B satisfying axioms (i) (iii).

6 I. Anshel et al. / Discrete Applied Mathematics 130 (2003) 3 12 Alice s: Bob s: Secret key: a S A Public key: (a; t i ) Secret key: b S b Public key: (b; s j ) Shared secret: 1 (a; (b; a)). 2. Intractable problems in combinatorial group theory Informally, a nitely presented group G is specied by a nite set of generators g 1 ;g 2 ;:::;g n ; where every g G is a word in the generators and their inverses (product of g i s and their inverses). Further, there are nitely many words r 1 ;r 2 ;:::;r m called relators and each r i denes the identity element of G. It is usual to suppress the trivial relations such as g i g 1 i = g 1 i g i = e: A presentation is written as {g 1 ;g 2 ;:::;g n r 1 ;r 2 ;:::;r m }. Examples. The nite cyclic group of order n has presentation: {g g n }. The modular group on two generators: {g 1 ;g 2 g 2 1;g 3 2}: The study of equations in nitely presented groups tookon signicance with the work of Max Dehn (1910 1912) [6] who formulated several now well-known problems. Fix a presentation G = {g 1 ;:::;g n r 1 ;:::;r m }: Word problem. Is there an algorithm to determine if an arbitrary word in G denes the identity element? Conjugacy problem. Is there an algorithm todetermine if twoarbitrary words v; w G dene conjugate elements, i.e. todetermine if there exists x G such that w = x 1 vx:

I. Anshel et al. / Discrete Applied Mathematics 130 (2003) 3 12 7 The following important progress has been made on these conjectures. In 1955 Novikov and Boone [6] constructed nitely presented groups whose word problem is algorithmically unsolvable. In 1971 Miller III [7] constructed a nitely presented residually nite group (this means g 1 g 2 can be distinguished in some nite image) with an algorithmically unsolvable conjugacy problem. Note that residually nite groups have a solvable word problem. 3. Concrete examples of non-abelian key agreement protocols We now present concrete examples of the above general non-abelian protocol (based on the theory of innite non-abelian groups) for secret key establishment between two parties whose only means of communication is a public channel. The security of the method is founded on the diculty of solving the conjugacy problem in innite non-abelian groups. Recall that the general non-abelian KAP (key agreement protocol) was based on the existence of a 5-tuple U; V; ; 1 ; 2 satisfying axioms (i) (iii). We now present two examples of this KAP in the case that U = V = G where G is an innite nitely presented non-abelian group. We now choose U = V = G = group; (x; y)=x 1 yx; 1 (u; v)=u 1 v; 2 (u; v)=v 1 u: Non-abelian KAP I Public information: G = nitely generated non-abelian group. Two subgroups of G: S A = s 1 ;s 2 ;:::;s m ; S B = t 1 ;t 2 ;:::;t n : Secret keys: Alice s secret key a S A, Bob s secret key b S B. Public keys:

8 I. Anshel et al. / Discrete Applied Mathematics 130 (2003) 3 12 Alice s public key a 1 t 1 a; a 1 t 2 a;:::;a 1 t n a; Bob s public key b 1 s 1 b; b 1 s 2 b;:::;b 1 s m b: Shared secret: a 1 b 1 ab: Security of the method: The Simultaneous Conjugacy Problem. Non-abelian KAP II Let G denote a non-abelian group with an intractable conjugacy problem. Assume G contains two commuting subgroups S A = s 1 ;s 2 ;:::;s m ; T B = t 1 ;t 2 ;:::;t n i.e., for all h S A and k T B hk = kh: Public information: p G = nitely generated non-abelian group. Two commuting subgroups of G: S A = s 1 ;s 2 ;:::;s m ; S B = t 1 ;t 2 ;:::;t n : Secret keys: Alice s secret key a S A, Bob s secret key b S B. Public key: Alice s public key a 1 pa;

I. Anshel et al. / Discrete Applied Mathematics 130 (2003) 3 12 9 Bob s public key b 1 pb: Shared secret: a 1 b 1 pab: Security of the method: Conjugacy Problem. The above method in the special case of the braid group, was rst presented by Ko et al. [5]. We will now show that this scheme is, in fact, a special case of the general non-abelian KAP for a suitable choice of the 5-tuple: (U; V;; 1 ; 2 ) satisfying the axioms (i) (iii). Let S be a set which contains an element e. We can make S into a monoid by dening a law of composition as follows: e x = x e = x (for all x S); x y = x (for all x; y S; x e; y e): Choose U to be the braid group B N. Fix a public element p B N. Dene V (rst as a set) to be the set of conjugates V = {xpx 1 x B N }: Then V is a monoid with identity p and law of composition as dened above. We now dene ; 1 ; 2. Denition. We dene (x; y)=xpx 1 V for all x; y B N. Clearly, satises axiom (i). We now let C(p) denote the centralizer of p in B N. Let x 1 ;x 2 ;:::;x N 1 denote the Artin generators for B N, and for some 1 N 1 dene subgroups A; B, where A is generated by x 1 ;:::;x 1 and B is generated by x +1 ;:::;x N 1. Denition. We dene p if u A C(p); 1 (u; v)= p if u A C(p) and v bpb 1 for all b B; ava 1 otherwise (where u a C(p)):

10 I. Anshel et al. / Discrete Applied Mathematics 130 (2003) 3 12 One checks that this denition is well dened and independent of the choice of a. Similarly, Denition. We dene p if u B C(p); 2 (u; v)= p if u B C(p) and v apa 1 for all a A; bvb 1 otherwise (where u b C(p)): One easily checks that axiom (ii) is satised. With these choices one obtains precisely the public-key scheme introduced in [5]. This demonstrates that the public key scheme introduced in [5] is a special case of the general algebraic protocol given in [2,3]. 4. Requirements for a group theory KAP The minimum requirements for a group theory KAP based on an innite non-abelian group G are: A fast method is required to rewrite a set of conjugates in G: a 1 t 1 a; a 1 t 2 a;:::;a 1 t m a so they become unrecognizable. A key extractor is required. A key extractor E is determined by a set K (Keyspace) and is a map E : G K from the group G to K, such that each element g G (regardless of the way it is expressed in the generators of G) is mapped to a unique key E(g). In order to insure that the process of key extraction should eventually give a bitstring which is distributed close to uniformly, it is necessary, in practice, to apply a hash function to the internal bit representation of one of the invariants. We shall simply assume that this is incorporated in E and not discuss it further. 4.1. Rewriting methods There are two basic methods for rewriting. The rst method is the canonical form method. This method requires the existence of a canonical form on the group G. Examples of groups with canonical forms include: Fundamental groups of graphs of groups (via Bass Serre theory, see [8]). One relator groups (via the Magnus approach see [6]). Classes of two relator groups (see [1]).

I. Anshel et al. / Discrete Applied Mathematics 130 (2003) 3 12 11 Groups which come from low dimensional topology (via Thurston s workon three manifolds (see [9]). The second method for rewriting is the subgroup method. This method requires the existence of a subgroup H 6 G; where a method of rewriting (i.e., a method to make words in H unrecognizable) is already known in the subgroup H. For example, the subgroup could have a canonical form. Now, every g G can be written in the form g = (g) g; where (g) is a word in H (i.e., it is expressed in the generators of H) and g G is a coset representative. Method. Rewrite (g) and then express (g) as a word in the generators of G. Remark. If one subgroup H with rewriting method exists, then one usually has a family of such subgroups given by the orbit of the action of the automorphism group of G acting on H. Since the choice of H is entirely private, an attacker cannot use properties of H to try to breakthe system. Since the result of this method is a word in the generators of the group G, this process can be iterated several times, using various subgroups where one has methods of rewriting, to strengthen the system. Examples of groups where this subgroup rewriting is a natural choice arise from the theory of extensions of groups, i.e., groups with non-trivial higher cohomology groups. 4.2. Key extraction methods Canonical forms. In the case of the Braid group, knot polynomials. Applying a homomorphism to a very large nite group. Computing an invariant in an image group. Examples of group invariants include: The Nielsen invariant of groups with innite cyclic abelianizations. The relation module and its applications. The nilpotent quotients of classes of solvable groups and Burnside groups. Low-dimensional homology and cohomology. Acknowledgements The authors wish to thankarithmetica Inc. for its support of this research.

12 I. Anshel et al. / Discrete Applied Mathematics 130 (2003) 3 12 References [1] I. Anshel, An introduction to a class of two relator groups, in: C.M. Campbell, E.F. Robertson (Eds.), Groups St. Andrews 1989, Vol. 1, London Mathematical Society, Lecture Note Series, Vol. 159, Cambridge University, Cambridge, 1991, pp. 14 29. [2] I. Anshel, M. Anshel, D. Goldfeld, A method and apparatus for cryptographically secure algebraic key establishment protocols, International Patent Application Number: WO 99/44324. U.S. patent allowed. [3] I. Anshel, M. Anshel, D. Goldfeld, An algebraic method for public-key cryptography, Math. Research Lett. 6 (1999) 287 291. [4] I. Anshel, M. Anshel, B. Fisher, D. Goldfeld, in: D. Naccacne (Ed.), New Key Agreement Protocols in Braid Group Cryptography, CT-RSA 2001, Lecture Notes in Computer Science, Vol. 2020, Springer, Berlin, 2001, pp. 13 27. [5] K.H. Ko, S.J. Lee, J.H. Chean, J.W. Han, J.S. Kang, C. Park, New public-key cryptosystem using braid groups, in: M. Bellare (Ed.), Advances in Cryptology-Crypto 2000, Lecture Notes in Computer Science, Vol. 1880, Springer, Berlin, 2000, pp. 166 183. [6] W. Magnus, A. Karrass, D. Solitar, Combinatorial Group Theory: Presentations of Groups in Terms of Generators and Dening Relators, 2nd Revised Edition, Dover, New York, 1976. [7] C.F. Miller, On Group-Theoretic Decision Problems and their Classication, in: Annals of Mathematics Studies, Vol. 68, Princeton University, Princeton, NJ, 1971. [8] J.P. Serre, Trees, Springer, Berlin, 1980. [9] W.P. Thurston, Three-dimensional Geometry and Topology, Vol. 1, Princeton University, Princeton, NJ, 1997.