Mean-set attack: cryptanalysis of Sibert et al. authentication protocol

被引:2
|
作者
Mosina, Natalia [1 ]
Ushakov, Alexander [2 ]
机构
[1] CUNY, LAGCC, Long Isl City, NY 11101 USA
[2] Stevens Inst Technol, Dept Math, Hoboken, NJ 07030 USA
关键词
Group-based cryptography; zero knowledge; authentication protocol; probability on graphs and groups; braid group; mean-set; mean-set attack principle; shift search problem;
D O I
10.1515/JMC.2010.006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We analyze the Sibert et al. group-based (Feige-Fiat-Shamir type) authentication protocol and show that the protocol is not computationally zero-knowledge. In addition, we provide experimental evidence that our approach is practical and can succeed even for groups with no efficiently computable length function such as braid groups. The novelty of this work is that we are not attacking the protocol by trying to solve an underlying complex algebraic problem, namely, the conjugacy search problem, but use a probabilistic approach, instead.
引用
下载
收藏
页码:149 / 174
页数:26
相关论文
共 50 条
  • [1] Cryptanalysis of Farash et al.'s SIP authentication protocol
    Azrour, Mourade
    Farhaoui, Yousef
    Ouanan, Mohammed
    INTERNATIONAL JOURNAL OF DYNAMICAL SYSTEMS AND DIFFERENTIAL EQUATIONS, 2018, 8 (1-2) : 77 - 94
  • [2] Cryptanalysis on Cheng et al. Protocol
    Thakur, Tejeshwari
    INNOVATIONS THROUGH MATHEMATICAL AND STATISTICAL RESEARCH: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES AND STATISTICS (ICMSS2016), 2016, 1739
  • [3] Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
    Irshad, Azeem
    Sher, Muhammad
    Alzahrani, Bander A.
    Albeshri, Aiiad
    Chaudhry, Shehzad Ashraf
    Kumari, Saru
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (01): : 523 - 549
  • [4] Cryptanalysis of Kumar et al.'s Authentication Protocol for Wireless Sensor Networks
    Ha, Sewan
    Ryu, Jihyeon
    Kim, Hyoungshick
    Won, Dongho
    Lee, Youngsook
    INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 : 329 - 340
  • [5] Cryptanalysis of Aydos et al.'s ECC-based wireless authentication protocol
    Sun, HM
    Hsieh, BT
    Tseng, SM
    2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, 2004, : 563 - 566
  • [6] Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol
    Safkhani, Masoumeh
    Pens-Lopez, Pedro
    Hernandez-Castro, Julio Cesar
    Bagheri, Nasour
    JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 2014, 259 : 571 - 577
  • [7] Cryptanalysis on improved Chou et al.'s ID-based deniable authentication protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 87 - +
  • [8] Cryptanalysis and the improvement of Kim et al.'s password authentication schemes
    Giri, Debasis
    Srivastava, P. D.
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 156 - 166
  • [9] Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol
    Tang, Hongbin
    Liu, Xinsong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 65 (03) : 321 - 333
  • [10] Cryptanalysis of Arshad et al.’s ECC-based mutual authentication scheme for session initiation protocol
    Hongbin Tang
    Xinsong Liu
    Multimedia Tools and Applications, 2013, 65 : 321 - 333