Paper 2019/1295

A trip between creation and destruction of non-commutative public key exchange protocols

Borja Gómez

Abstract

Conventional asymmetric key exchange protocols rely on computing elements in commutative groups, where the employed trapdoor-permutation function is commutative, allowing Alice and Bob to compute the same element in $G$ as changing the orders of the variables or elements doesn't alter the output. The research found in this paper is focused on the analysis of key exchange protocols found in non-commutative cryptography, sometimes called group-based cryptography. Variations of these schemes made by the author are also included. Concretely, four schemes are presented using matrices over finite fields and permutation groups containing all the theory to break these schemes along with its pseudo-code and implementations in Mathematica.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
non-commutativepublic key cryptographygroup based cryptographygroup theoryalgebraic combinatorics
Contact author(s)
kub0x @ elhacker net
History
2019-11-11: received
Short URL
https://ia.cr/2019/1295
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/1295,
      author = {Borja Gómez},
      title = {A trip between creation and destruction of non-commutative public key exchange protocols},
      howpublished = {Cryptology ePrint Archive, Paper 2019/1295},
      year = {2019},
      note = {\url{https://eprint.iacr.org/2019/1295}},
      url = {https://eprint.iacr.org/2019/1295}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.