Mean-set attack: cryptanalysis of Sibert et al. authentication protocol

被引:2
|
作者
Mosina, Natalia [1 ]
Ushakov, Alexander [2 ]
机构
[1] CUNY, LAGCC, Long Isl City, NY 11101 USA
[2] Stevens Inst Technol, Dept Math, Hoboken, NJ 07030 USA
关键词
Group-based cryptography; zero knowledge; authentication protocol; probability on graphs and groups; braid group; mean-set; mean-set attack principle; shift search problem;
D O I
10.1515/JMC.2010.006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We analyze the Sibert et al. group-based (Feige-Fiat-Shamir type) authentication protocol and show that the protocol is not computationally zero-knowledge. In addition, we provide experimental evidence that our approach is practical and can succeed even for groups with no efficiently computable length function such as braid groups. The novelty of this work is that we are not attacking the protocol by trying to solve an underlying complex algebraic problem, namely, the conjugacy search problem, but use a probabilistic approach, instead.
引用
收藏
页码:149 / 174
页数:26
相关论文
共 50 条
  • [21] Comment on Xu et al.'s Key Agreement and Password Authentication Protocol
    Guo, Yongning
    Liu, Chenglian
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 3847 - +
  • [22] Cryptanalysis of Vaidya et al.'s User Authentication Scheme with Key Agreement in Wireless Sensor Networks
    Li Jiping
    Ding Yaoming
    Xiong Zenggang
    Liu Shouyin
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 619 - 623
  • [23] Cryptanalysis of Xinyu et al.'s NTRU-lattice based key exchange protocol
    Valluri, Maheswara Rao
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (02): : 475 - 479
  • [24] Cryptanalysis of Alvarez et al. key exchange scheme
    Kamal, Abdel Alim
    Youssef, Amr M.
    INFORMATION SCIENCES, 2013, 223 : 317 - 321
  • [25] Cryptanalysis of Yeh et al.'s Security-Enhanced Remote User Authentication Scheme with Smart Cards
    Shieh, Wen-Gong
    Horng, Wen-Bing
    JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2013, 16 (03): : 319 - 328
  • [26] Security analysis of Kulseng et al.'s mutual authentication protocol for RFID systems
    Yang, Y.
    Gu, J.
    Lv, C.
    Jiang, Q.
    Ma, W.
    IET INFORMATION SECURITY, 2012, 6 (04) : 239 - 248
  • [27] Revisiting Yasuda et al.'s Biometric Authentication Protocol: Are You Private Enough?
    Pagnin, Elena
    Liu, Jing
    Mitrokotsa, Aikaterini
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2017), 2018, 11261 : 161 - 178
  • [28] Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card
    Kumari, Saru
    Gupta, Mridul K.
    Kumar, Manoj
    OPEN COMPUTER SCIENCE, 2012, 2 (01): : 60 - 75
  • [29] Security Analysis of Wu et al.'s Authentication Protocol for Distributed Cloud Computing
    Wu, Tsu-Yang
    Lee, Zhiyuan
    Huang, Yanyu
    Chen, Chien-Ming
    Chen, Yeh-Cheng
    2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2019,
  • [30] Smart-card-loss-attack and Improvement of Hsiang et al.'s Authentication Scheme
    Lee, Y. C.
    JOURNAL OF APPLIED RESEARCH AND TECHNOLOGY, 2013, 11 : 597 - 603