Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings

Research output: Contribution to journalArticlepeer-review

Abstract

It was recently demonstrated that the Matrix Action Key Exchange (MAKE) algorithm, a new type of key exchange protocol using the semidirect product of matrix groups, is vulnerable to a linear algebraic attack if the matrices are over a commutative ring. In this note, we establish conditions under which protocols using matrices over a non-commutative ring are also vulnerable to this attack. We then demonstrate that group rings R[G] used in arXiv:1304.6572, where R is a commutative ring and G is a non-abelian group, are examples of non-commutative rings that satisfy these conditions.
Original languageEnglish
Article number130528
Pages (from-to)2-9
JournalMathematical Cryptology
Volume1
Issue number2
Publication statusPublished - 18 Mar 2022
EventMathCrypt 2021 -
Duration: 15 Aug 2021 → …
https://crypto.iacr.org/2021/mathcrypt.php

Bibliographical note

(c) 2022 Christopher Battarbee, Delaram Kahrobaei, Siamak F. Shahandashti

Keywords

  • key exchange
  • cryptography
  • post-quantum cryptography
  • semidirect product
  • cryptanalysis
  • linear algebra

Cite this