Abstract
It was recently demonstrated that the Matrix Action Key Exchange (MAKE) algorithm, a new type of key exchange protocol using the semidirect product of matrix groups, is vulnerable to a linear algebraic attack if the matrices are over a commutative ring. In this note, we establish conditions under which protocols using matrices over a non-commutative ring are also vulnerable to this attack. We then demonstrate that group rings R[G] used in arXiv:1304.6572, where R is a commutative ring and G is a non-abelian group, are examples of non-commutative rings that satisfy these conditions.
Original language | English |
---|---|
Article number | 130528 |
Pages (from-to) | 2-9 |
Journal | Mathematical Cryptology |
Volume | 1 |
Issue number | 2 |
Publication status | Published - 18 Mar 2022 |
Event | MathCrypt 2021 - Duration: 15 Aug 2021 → … https://crypto.iacr.org/2021/mathcrypt.php |
Bibliographical note
(c) 2022 Christopher Battarbee, Delaram Kahrobaei, Siamak F. ShahandashtiKeywords
- key exchange
- cryptography
- post-quantum cryptography
- semidirect product
- cryptanalysis
- linear algebra