HOME

TheInfoList



OR:

Anshel–Anshel–Goldfeld protocol, also known as a commutator key exchange, is a key-exchange protocol using nonabelian groups. It was invented by Drs. Michael Anshel, Iris Anshel, and Dorian Goldfeld. Unlike other group-based protocols, it does not employ any commuting or commutative subgroups of a given platform group and can use any nonabelian group with efficiently computable normal forms. It is often discussed specifically in application of braid groups, which notably are infinite (and the group elements can take variable quantities of space to represent). The computed shared secret is an element of the group, so in practice this scheme must be accompanied with a sufficiently secure compressive
hash function A hash function is any Function (mathematics), function that can be used to map data (computing), data of arbitrary size to fixed-size values, though there are some hash functions that support variable-length output. The values returned by a ...
to normalize the group element to a usable bitstring.


Description

Let G be a fixed nonabelian
group A group is a number of persons or things that are located, gathered, or classed together. Groups of people * Cultural group, a group whose members share the same cultural identity * Ethnic group, a group whose members share the same ethnic iden ...
called a ''platform group''. Alice's public/private information: * ''Alice's public key'' is a tuple of elements =(a_1,\ldots,a_n) in G. * ''Alice's private key'' is a sequence of elements from and their inverses: a_^, \ldots, a_^, where a_\in and \varepsilon_k=\pm 1. Based on that sequence she computes the product A = a_^ \ldots a_^. Bob's public/private information: * ''Bob's public key'' is a tuple of elements =(b_1,\ldots,b_n) in G. * ''Bob's private key'' is a sequence of elements from and their inverses: b_^, \ldots, b_^, where b_\in and \delta_k=\pm 1. Based on that sequence he computes the product B = b_^ \ldots b_^. Transitions: * Alice sends a tuple =(A^b_1A,\ldots,A^b_nA) to Bob. * Bob sends a tuple =(B^a_1B,\ldots,B^a_nB) to Alice. Shared key: The key shared by
Alice and Bob Alice and Bob are fictional characters commonly used as placeholders in discussions about cryptography, cryptographic systems and Cryptographic protocol, protocols, and in other science and engineering literature where there are several partici ...
is the group element K = A^ B^ A B \in G called the
commutator In mathematics, the commutator gives an indication of the extent to which a certain binary operation fails to be commutative. There are different definitions used in group theory and ring theory. Group theory The commutator of two elements, ...
of A and B. * Alice computes K as a product A^ \cdot \left(B^a_^B\right)\cdots \left(B^a_^B\right) = A^ B^ A B. * Bob computes K as a product \left(A^b_^A\right) \cdots \left(A^ b_^A^\right) \cdot B = A^ B^ A B.


Security

From the standpoint of an attacker trying to attack the protocol, they usually learn the public keys \bf a and \bf b, and the conjugated public keys \overline and \overline. A direct attack then consists of trying to find a suitable A that is generated by the elements of \bf a, and that produces the appropriate conjugations \overline when applied. (An 'indirect' attack would consist of trying to find K directly, which would require some additional special structure of the group.) For this reason the public keys \bf a and \bf b must be chosen to generate a large subgroup of G — ideally, they form a full set of generators, so that A cannot be constrained just by knowing that is generated from \bf a. Solving for a suitable A given the conjugation relations is called the ''conjugation problem'', and substantial research has been done on attacks to the conjugacy problem on
braid group In mathematics, the braid group on strands (denoted B_n), also known as the Artin braid group, is the group whose elements are equivalence classes of Braid theory, -braids (e.g. under ambient isotopy), and whose group operation is composition of ...
s, although no full efficient solution has achieved.


See also

* Algebraic Eraser * Group-based cryptography


References

*


Further reading

* Baev, D., et al. (2021)
"Modification of Anshel-Anshel-Goldfeld Postquantum Algorithm / Protocol Based on Algebraic Braid Groups, in Order to the Span–Cyberattack Neutralization"
J. Phys.: Conf. Ser. 2131 022079. 2021.


External links


Michael Anshel's website
{{DEFAULTSORT:Anshel-Anshel-Goldfeld key exchange Cryptographic protocols