Research article

On the security of the STR key exchange protocol

  • Received: 11 October 2024 Revised: 05 December 2024 Accepted: 16 December 2024 Published: 07 February 2025
  • MSC : 15A16, 15A18, 15A20, 94A60

  • In this paper, we consider the security of the Sakalauskas-Tvarijonas-Raulynaitis (STR) key exchange protocol. We perform an analysis by exploring various cases of the canonical form of the publicly known matrix using elements of linear algebra and number theory. Additionally, we consider the multiplicative order of matrices and show how these two factors affect the security of the considered protocol. We show that regardless of the choice of publicly known matrix, the considered protocol is secure under the discrete logarithm assumption. In other words, if at least one of the secret exponents is found, then the STR protocol can be broken in polynomial time.

    Citation: Aleksejus Mihalkovich. On the security of the STR key exchange protocol[J]. AIMS Mathematics, 2025, 10(2): 1967-1980. doi: 10.3934/math.2025092

    Related Papers:

    [1] B. Amutha, R. Perumal . Public key exchange protocols based on tropical lower circulant and anti circulant matrices. AIMS Mathematics, 2023, 8(7): 17307-17334. doi: 10.3934/math.2023885
    [2] Aleksejus Mihalkovich, Jokubas Zitkevicius, Eligijus Sakalauskas . The security analysis of the key exchange protocol based on the matrix power function defined over a family of non-commuting groups. AIMS Mathematics, 2024, 9(10): 26961-26982. doi: 10.3934/math.20241312
    [3] Huawei Huang, Xin Jiang, Changwen Peng, Geyang Pan . A new semiring and its cryptographic applications. AIMS Mathematics, 2024, 9(8): 20677-20691. doi: 10.3934/math.20241005
    [4] Hafeez Ur Rehman, Mohammad Mazyad Hazzazi, Tariq Shah, Amer Aljaedi, Zaid Bassfar . Color image encryption by piecewise function and elliptic curve over the Galois field $ {G}{F}\left({2}^{{n}}\right) $. AIMS Mathematics, 2024, 9(3): 5722-5745. doi: 10.3934/math.2024278
    [5] Kun Liu, Chunming Tang . Privacy-preserving Naive Bayes classification based on secure two-party computation. AIMS Mathematics, 2023, 8(12): 28517-28539. doi: 10.3934/math.20231459
    [6] Dieaa I. Nassr, Hatem M. Bahig, Mohamed A. G. Hazber, Ibrahim M. Alseadoon, Hazem M. Bahig . A fast semiring-based public-key encryption. AIMS Mathematics, 2025, 10(4): 8569-8586. doi: 10.3934/math.2025393
    [7] Elahe Mehraban, T. Aaron Gulliver, Salah Mahmoud Boulaaras, Kamyar Hosseini, Evren Hincal . New sequences from the generalized Pell $ p- $numbers and mersenne numbers and their application in cryptography. AIMS Mathematics, 2024, 9(5): 13537-13552. doi: 10.3934/math.2024660
    [8] Julian Osorio, Carlos Trujillo, Diego Ruiz . Construction of a cryptographic function based on Bose-type Sidon sets. AIMS Mathematics, 2024, 9(7): 17590-17605. doi: 10.3934/math.2024855
    [9] Muhammad Sajjad, Tariq Shah, Huda Alsaud, Maha Alammari . Designing pair of nonlinear components of a block cipher over quaternion integers. AIMS Mathematics, 2023, 8(9): 21089-21105. doi: 10.3934/math.20231074
    [10] Wan Nur Aqlili Ruzai, You Ying, Khairun Nisak Muhammad, Muhammad Asyraf Asbullah, Muhammad Rezal Kamel Ariffin . Concurrent factorization of RSA moduli via weak key equations. AIMS Mathematics, 2024, 9(10): 28211-28231. doi: 10.3934/math.20241368
  • In this paper, we consider the security of the Sakalauskas-Tvarijonas-Raulynaitis (STR) key exchange protocol. We perform an analysis by exploring various cases of the canonical form of the publicly known matrix using elements of linear algebra and number theory. Additionally, we consider the multiplicative order of matrices and show how these two factors affect the security of the considered protocol. We show that regardless of the choice of publicly known matrix, the considered protocol is secure under the discrete logarithm assumption. In other words, if at least one of the secret exponents is found, then the STR protocol can be broken in polynomial time.



    Non-commuting cryptography is currently considered a prospective field of research due to the potentially hard problems defined in noncommutative algebraic structures. In this area of cryptography the first ideas date back to the start of the millennium when the Anshel et al. and Ko et al. key exchange protocols (KEPs) were published [1,2].

    In [2], Ko et al. claimed that the security of their protocol relies on the so-called conjugate search problem, which is defined as follows [3]:

    Definition 1. Let us assume that S is a noncommutative (semi)group, and the two elements g,hS are fixed. The conjugate search problem is to find an element xS such that

    h=xgx1. (1.1)

    Let us present the Ko-Lee KEP. Assume that the noncommutative (semi)group S, the subset of commuting invertible elements C, and the elements

    gSC

    are all publicly known. Using the conjugation relation (1.1), two entities named Alice and Bob can agree on a shared key by performing the following actions [2]:

    (1) Alice chooses an arbitrary element xC, and computes the following:

    a=xgx1.

    She keeps x hidden and publishes a online;

    (2) Bob picks an arbitrary element yC and calculates the following:

    b=ygy1.

    He keeps y for himself and publishes b;

    (3) Alice calculates the shared key

    k=xbx1

    and Bob obtains the same result by calculating

    k=yay1.

    It can be easily checked that the protocol is valid, since x and y come from the subset of commuting elements C; therefore,

    xy=yx.

    Interestingly enough, the conjugation relation (1.1) has the following property:

    x(ygy1)x1=(xy)g(xy)1, (1.2)

    which holds for any x,yS. Therefore, Ko-Lee KEP can be viewed as a certain analog of the Diffie-Hellman KEP for noncommutative algebraic structures. In other words, if we use the notation

    gx=xgx1,

    then the Ko-Lee protocol matches the Diffie-Hellman KEP almost word-for-word.

    Unfortunately, the Ko-Lee protocol has a flaw revealed in [3], where the authors explained that the conjugate search problem can be replaced with the double coset problem defined below:

    Definition 2. Let us assume that S is a noncommutative (semi)group, and two elements g,hS are fixed. The double coset problem is to find two elements x1,x2S such that

    h=x1gx2. (1.3)

    Comparing the two problems, we can see that the double coset problem completely ignores the link between the secret elements x and x1 in (1.1). Due to this fact, Alice and Bob can agree on two public subsets of the commuting elements C1 and C2 without affecting the validity of the Ko-Lee protocol in any way. Furthermore, the requirement for x1 and x2 to be invertible can be ignored as well. The same is true for y1 and y2. Simply put, any links between the secret elements in (1.1) have vanished in (1.3).

    In 2007, a Lithuanian group of researchers combined the ideas of the Ko-Lee and Diffie-Hellman KEPs. Their protocol quickly became known as the Sakalauskas-Tvarijonas-Raulynaitis (STR) KEP [4]. This protocol drew the attention of the cryptographic society (see [5,6,7,8,9]). However, based on the properties of matrices, it was pointed out that the STR KEP might not be secure enough to withstand the quantum cryptanalysis [7]. On the other hand, in their papers [5,9], the authors considered the security of the protocols based on conjugation relation more generally. Here, we wish to focus on one specific protocol and explore its security in more detail. We aim to show that the STR KEP is not quantum-safe, which was stated in [7].

    In this paper, we demonstrate that once at least one of the secret exponents is found, the STR protocol can be broken in polynomial time. Moreover, in some cases, the considered protocol can be broken without restoring the original exponent by computing an alternative key that uses a smaller exponent. Additionally, we demonstrate the case when the true value of the secret exponent is irrelevant.

    The rest of this paper is organized as follows: in Section 2, we present the STR protocol and define its main parameters; in Section 3, we formalize the security of the STR protocol in the form of two games; in Section 4, we establish the main tools and perform the attack on the STR KEP; and finally, the conclusions and suggestions for future investigations are presented at the end of this paper.

    In this section, we revise the considered protocol. We assume that the STR KEP uses matrices with entries from a field of integers Zp, where p is a large prime. As usual, the addition and multiplication operations in Zp are performed modulo p. We keep this in mind throughout this paper and omit the modulo in all mathematical expressions. Therefore, we limit the analysis of this protocol to one certain class of groups.

    The general concept of the STR KEP borrows ideas from the Diffie-Hellman and Ko-Lee protocols and combines them using calculations performed with square matrices of the size m. The group-defining parameter p, a set of commuting square m×m matrices Gm(Zp), and a matrix

    QZm×mpGm(Zp)

    is published online. Alice and Bob use this public data to agree on a common key K using the following actions [4]:

    (1) Alice randomly chooses a matrix XGm(Zp) and a large integer r>1. She calculates a matrix

    A=XQrX1,

    thus obtaining a public key

    PuKA=A,

    which is published online. Her private key

    PrKA=(X,r)

    is kept hidden.

    (2) Bob randomly picks a matrix YGm(Zp) and a large integer s>1. He calculates

    B=YQsY1,

    and thus obtains a public key

    PuKB=B,

    which is published online. He keeps the private key

    PrKB=(Y,s)

    hidden.

    (3) Alice uses Bob's public key B and her private key (X,r) to calculate the following:

    KA=XBrX1.

    (4) Bob uses Alice's public key A and his private key (Y,s) to calculate the following:

    KB=YAsY1.

    Since X and Y commute, we have the following:

    KA=XBrX1=X(YQsY1)rX1=XYQsrY1X1=YXQrsX1Y1=Y(XQrX1)sY1=YAsY1=KB.

    Furthermore, the integer powers r and s are clearly commuting. Therefore, Alice and Bob have agreed on a shared key:

    K=KA=KB.

    Note that the private powers r and s are limited above by the multiplicative order of the matrix Q, which we denote by ordpQ. This important fact implies restrictions on the public matrix Q to ensure a large enough value of ordpQ. In fact, we can use the tools of linear algebra along with the group theory to control the value ordpQ in Zp. Here, we use these observations to analyze the security of the STR KEP.

    Another important part of the public data is the set of commuting matrices Gm(Zp). For the STR KEP to be secure, this set has to be large and, preferably, its elements (matrices) should be easy to generate. However, there are multiple ways to achieve both of the presented properties. For example, one could either use the set of cyclic invertible matrices or the set of polynomials of some known matrix M. In the latter case, the tools of linear algebra can be used to fit our needs.

    We now present formal definitions of the security games for the STR protocol, which are interpreted as interactions between the attacker A and the challenger C, where the goal of A is to gain any kind of valuable information to predict the outcome of the actions performed by the challenger. The probability of A to win a security game is called A's advantage [10]. For the KEP to be secure against a certain attack, A's advantage in winning an appropriate security game should be negligible.

    The simplest idea of breaking any KEP is to compromise at least one of the private keys, PrA or PrB, in any way possible using mathematical tools. Therefore, the attacker A may somehow retrieve the actual key used by, say, Alice, or obtain an alternative key, which was not generated by Alice, but produces the same public key. This idea can be formalized by the following experiment:

    Security game 1. Let us assume that the group-defining parameter p, the group of commuting matrices Gm(Zp), and a matrix

    QZm×mpGm(Zp)

    are fixed.

    (1) The challenger C generates the private keys of both Alice and Bob

    PrKA=(X,r)

    and

    PrKB=(Y,s),

    where X,YGm(Zp);

    (2) C generates public keys

    A=XQrX1

    and

    B=YQsY1,

    and calculates the shared key

    K=(XY)Qrs(XY)1;

    (3) The challenger sends the public keys (A,B) to A.

    Relying on the obtained pair A outputs a guess for the shared key KA. He wins the game if

    KA=K.

    Here, the goal of attacker A is to calculate the shared key. Hence, the presented security game is the formal definition of the so-called computational assumption. Essentially, it states that given the public keys of both protocol parties, it is hard to calculate the shared key. Obviously, if A wins the presented security game, then the protocol is compromised and can no longer be considered safe since A is able to impersonate one of the parties. Furthermore, A can decrypt all the messages encrypted with the shared key if it is used for a symmetric encryption.

    Another important question in the case of the STR KEP is whether the attacker A can somehow distinguish between the actual shared key K and a truly random matrix with entries uniformly chosen from Zp. In other words, given the public keys of both parties and a third matrix Kδ, can A decide if Kδ is the shared key or not? Now, we present a formal definition of this experiment:

    Security game 2. Let us assume that the group-defining parameter p, the group of commuting matrices Gm(Zp), and a matrix

    QZm×mpGm(Zp)

    are fixed. For the randomly chosen value of δ{0,1}, we define the following experiment:

    (1) The challenger C generates the private keys of both Alice and Bob

    PrKA=(X,r)

    and

    PrKB=(Y,s),

    where X,YGm(Zp);

    (2) C generates public keys

    A=XQrX1

    and

    B=YQsY1;

    (3) If δ=0, then C calculates the following shared key:

    K0=(XY)Qrs(XY)1;

    (4) If δ=1, then C generates a random pair (Z,t), where the matrix ZGm(Zp) and t>1 is a large integer. Then, he computes the following:

    K1=ZQtZ1;

    (5) The challenger sends the triplet (A,B,Kδ) to A.

    Relying on the obtained data A outputs a guess δA. He wins the game if δA=δ.

    The presented security game is the formal definition of the decisional assumption for the STR protocol. We refer to it as the decisional STR assumption. Notably, this assumption is stronger than the computational one in the following sense: If A is able to win the Security game 1, then he can obviously win the Security game 2 with an advantage of 1, since he just found the shared key. On the other hand, if A cannot distinguish between a truly random matrix and the shared key, then he evidently cannot approach Security game 1, since he views the triplet (A,B,Kδ) as three independent random matrices.

    In the next section, we use the notions of the computational and decisional STR assumptions to analyze the security of the STR KEP.

    Let us assume that the group-defining parameter p, the generator M of the group of commuting matrices Gm(Zp), and a matrix

    QZm×mpGm(Zp).

    At the heart of the security of STR KEP lies the following problem:

    Definition 3. The following system of matrix equations:

    {XQrX1=A,XM=MX, (4.1)

    where XGm(Zp) and the integer r are unknown whereas

    A=XQrX1

    is known, is called an STR problem.

    Note that the authors of [5,6,9] may refer to this problem by a different name, but the general idea stays the same.

    If the attacker A is able to solve the STR problem, then he can use the obtained pair (X,r) to compromise the shared key, thus winning both of the security games presented above.

    First, let us consider the simplest version of the STR problem (i.e., we assume that the matrix Q is diagonalizable). In this case, we have the following:

    ordpQ=lcm(ordpλ1,ordpλ2,,ordpλm),

    where λ1,λ2,,λmZp are the eigenvalues of Q, and ordpλk is the multiplicative order of λk in Zp. Therefore, it does not exceed p1 due to Euler's theorem, and hence the computational STR assumption holds only under the discrete logarithm assumption. Now, we can see that for this choice of matrix Q, STR is as safe as the Diffie-Hellman KEP. This means that it cannot provide protection against quantum cryptanalysis due to the result by P. Shor presented in his paper [11].

    On the other hand, we could generate a matrix Q with all of the eigenvalues equal to the element 1Zp. Note that the latter fact does not mean that Q is an identity matrix. For example, the following works:

    Q=(110010001).

    However, the element 1 is an idempotent (i.e., 1r=1 regardless of the value of r). On the other hand, we can easily check that we clearly have ordpQ>1 in any field Zp for the example matrix Q. Similar problems also arise if the eigenvalue of 0 is considered. Moreover, in this case, we may never get back to the original matrix, but rather the cycle may loop at some power r of Q, i.e., we could have

    Qr+ordpQ=Qr,

    but

    Qr1+ordpQQr1.

    This means that the attacker cannot rely on the eigenvalues alone in his attempts to gain information on the value of ordpQ. Additionally, the structure of matrix Q has to be taken into consideration.

    We already see that the simplest case presented above does not cover the complexity of the STR problem in full, since the eigenvalues of matrix Q are not the only key factors affecting the multiplicative order. Note that since Zp is a field, the canonical form of matrix Q can be defined. In this case, the structure of the canonical form also influences the value of ordpQ and factors such as the number of Jordan blocks, the eigenvalue of the individual block, and the size of each block all play their part in determining the multiplicative order of Q. Therefore, in this paper, we discuss how these factors affect the complexity of the STR problem.

    First, we present several propositions that are related to the multiplicative order of a matrix in a field Zp. These propositions help us to obtain an upper bound on the matrix exponents r and s.

    Proposition 1. Assume that the matrix Q is similar to the following m×m Jordan block:

    Jm(1)=(1100001100001000001100001). (4.2)

    The multiplicative order of matrix Q is a multiple of p, i.e.,

    ordpQ=kp,

    where k is the minimal value that kpm.

    Proof. The proof of this proposition is based on a well-known fact that by raising the Jordan block Jm(1) to integer powers, we obtain the binomial coefficients in the upper half of the matrix. More precisely, we have the following:

    Jrm(1)=(1(r1)(r2)(rm2)(rm1)01(r1)(rm3)(rm2)001(rm4)(rm3)0001(r1)00001). (4.3)

    Note that

    (r0)=(rr)=1

    and by definition

    (rk)=0,

    if k>r, meaning that there are no ways to choose k items out of r if k>r. Additionally, it is known from number theory that for a prime p, all the binomial coefficients (pk), aside from (p0) and (pp), are multiples of p. Therefore, if

    m=p+1,

    then the top right corner entry of Jrm(1) is 1 and we need to wait until r reaches 2p for the cycle to loop. Similar observations can be made if

    m>p+1.

    However, since m is the size of square matrices, we can assume that it is always less than p. Hence, we claim that

    ordpJm(1)=p.

    Furthermore, since the multiplicative order is invariant under the similarity relation, for any matrix Q similar to Jm(1), we have the following:

    ordpQ=p.

    Proposition 2. Assume that the matrix Q is similar to the following m×m Jordan block:

    Jm(λ)=(λ10000λ10000λ00000λ10000λ), (4.4)

    where λ0. Then, we have the following:

    ordpQ=lcm(ordpλ,ordpJm(1)).

    Proof. The proof of this proposition follows directly from the following equality:

    Jrm(λ)=(λr(r1)λr1(r2)λr2(rm2)λrm+2(rm1)λrm+10λr(r1)λr1(rm3)λrm+3(rm2)λrm+200λr(rm4)λrm+4(rm3)λrm+3000λr(r1)λr10000λr). (4.5)

    Note that λk0 for any value of k if λ0. Therefore, the cycle of powers will loop the first time the two cycles (powers of λ and powers of Jm(1)) will loop at the same point. This point is exactly the lcm(ordpλ,ordpJm(1)).

    Corollary 1. Assume that the matrix Q is similar to Jm(λ). Then, the maximal value of

    ordpQ=(p1)ordpJm(1).

    This value is achieved, if λ is a generator of Zp.

    Since almost always m<p, we can simplify the expression in Corollary 1 to the following:

    ordpQ=p(p1).

    This fact has to be taken into consideration when the Security game 1 is played. By considering the eigenvalue λ alone, the attacker can only obtain its power r modulo (p1). We denote this power by rp.

    Now, let us denote the direct sum of the two matrices A and B by . In other words, we have the following:

    AB=(A00B).

    Proposition 3. Assume that the matrix Q is similar to a Jordan matrix

    J=Jm1(λ1)Jm2(λ2)Jmk(λk),

    where

    ki=1mi=m

    and λ1,λ2,,λk are eigenvalues of Q (not necessarily distinct). Then, we have the following:

    ordpQ=lcm(ordpJm1(λ1),ordpJm2(λ2),,ordpJmk(λk)).

    Therefore, we can see that the maximal multiplicative order of matrix Q with eigenvalues from the initial field Zp is determined as follows:

    ordpQ=p(p1).

    This can only be changed if the eigenvalues of Q are contained in some extension of Zp. However, we do not consider this case here, since the basic ideas remain the same, only in slightly more complicated algebraic structures.

    Lastly, due to (4.5), note that Jm(0) is a nilpotent matrix with its m-th power equal to a zero matrix. However, since m is usually reasonably small, the first m powers can easily be considered separately.

    As of now, it seems that for the setup considered here, the attacker A has to calculate the secret exponents r and s modulo ordpQ. Unfortunately, in the next section, we show that it is enough to restore one of the secret exponents modulo (p1). Moreover, the STR protocol becomes insecure once we find the secret exponent.

    First, let us consider the case when Q is similar to Jm(1). Without a loss of generality, we assume that

    Q=Jm(1)

    and denote it J for short. Furthermore, since the similarity relation lies at the heart of the STR protocol, which preserves not only the eigenvalues, but the Jordan blocks as well, we assume that the public key matrix A can be expressed as follows:

    A=S1JS.

    Note that regardless of the power r in the relation

    A=X1JrX,

    the general expression for Jr is given by (4.3), and, since 1 is an idempotent, Jr is similar to J regardless of the value of r. Therefore, we express

    Jr=T1JT

    for some matrix T.

    Now, we consider the first matrix equation of the STR problem (4.1). We have the following:

    X1JrX=S1JS,SX1JrXS1=J,SX1T1JTXS1=J.

    We can now denote

    TXS1=U.

    Then, we obtain the following:

    U1JU=J.

    Despite the fact that we have lost the relation of U to the generator matrix M in the original STR problem (4.1), the latter equation can be easily solved using linear algebra, since it can be transformed to the following homogeneous matrix equation:

    JUUJ=0.

    Hence, despite the upper bound for r being p, the value of r contributes nothing to the complexity of the STR problem. Furthermore, since matrix X may be restored from U, the computational and hence decisional assumptions do not hold for this choice of Q.

    Without a loss of generality, let us assume that

    Q=Jm(λ),

    where λ1. In this case, we can express A as follows:

    A=S1Jm(μ)S,

    where Jm(μ) is a Jordan block, and S is the change-of-basis matrix. However, due to the STR problem (4.1), the eigenvalues λ and μ are mathematically linked via a congruence

    λrμmodp. (4.6)

    Note that since Zp is a field, the change-of-basis matrix S can be computed using methods of linear algebra and number theory.

    We can now see that, despite the upper bound for r being p(p1), the attacker A is only interested in finding the following value:

    rp=rmod(p1).

    This comes from the fact that matrices Qr and Qrp have the same eigenvalues; hence, these matrices are linked via the similarity relation:

    Qr=T1QrpT.

    Then, by performing transformations as in the previous case, we end up with the following equation:

    QrpUUJm(μ)=0,

    where

    U=TXS1

    is an unknown matrix. However, this equation is linear and can be easily solved. Therefore, the computational STR assumption only holds under the discrete logarithm assumption. Moreover, the decisional STR assumption does not hold, since the attacker can obtain a non-negligible advantage in winning the Security game 2 by inspecting the canonical form of the Kδ. Simply put, if the discrete logarithm problem is solved, then the STR problem is solved as well.

    Finally, let us consider the general representation of

    Q=jm1(λ1)Jm2(λ2)Jmk(λk),

    where λ1,λ2,,λk are elements of Zp. Then, we can express A as follows:

    A=S1JS,

    where

    J=Jm1(μ1)Jm2(μ2)Jmk(μk)

    for some eigenvalues μ1,μ2,,μk. An attacker can use any pair (λi,μi) to solve Eq (4.6), where λi1. Then he reconstructs all the actions presented for previous cases. For example, the choice of a suitable pair (λi,μi) can be based on the size of the Jordan blocks. Therefore, the hardest canonical form to consider is the one where all the Jordan blocks have equal sizes, since it is harder for the attacker to find μj matching λi. However, the size of matrices m is assumed to be reasonably small; hence, the attacker can simply explore all possible pairs to find matches.

    We can sum up all of the presented cases in the following proposition:

    Proposition 4. Let us consider the STR problem (4.1). We have the following:

    If all the eigenvalues of the matrix Q are in Zp, then the STR KEP is secure under the discrete logarithm assumption;

    If all the eigenvalues of the matrix Q are in Zp, then the secret exponent has to be restored modulo (p1) in Zp;

    If all the eigenvalues of Q are in GF(pm), then the STR KEP is secure under the discrete logarithm assumption in GF(pm);

    If the secret exponent is revealed, then the STR KEP can be broken in polynomial time.

    Therefore, the general algorithm for the attack on the STR KEP consists of the following steps:

    (1) Find the canonical form of the public key matrix A.

    (2) Choose a pair of eigenvalues (λi,μi) of the matrices Q and A, respectively. Then, construct Eq (4.6) and solve it. This step may be repeated multiple times to increase the chance of the successful attack.

    (3) Use the secret exponent to obtain the system of linear equations to find the private matrix U.

    (4) Since the matrices T and S1 are known, the adversary computes

    X=T1US.

    The first step in this attack is the key step. Therefore, one of the possible solutions to escape this attack is for Alice and Bob to agree on an algebraic structure S, where the canonical form of matrix Q is hard to find (or undefined if it is possible). Then, the mapping used in the STR KEP can be modified so that the entries of the matrix Q are chosen from S, whereas the entries of X and Y are picked from ZordS. Furthermore, the following identity must hold:

    XQrX1=(XQX1)r, (4.7)

    i.e., the scalar values of the matrices X and Y have to somehow interact with the entries of Q to ensure the correctness of the protocol. Here, the main obstacle is the fact that exponentiation of the matrix Q requires both addition and multiplication operations in S. However, the existence of both these operations could potentially lead to the existence of the canonical form of the matrix Q. Moreover, it is not clear whether the interaction between the two structures S and ZordS satisfies the identity (4.7) is possible.

    In this paper, we considered the security of the STR KEP. Though the maximal value of the secret exponents r and s are limited above by the multiplicative order of the matrix Q, we have shown that it is enough to restore one of the secret exponents modulo (p1). Furthermore, if the secret exponent is found, then the STR protocol is no different from the Ko-Lee KEP since the middle matrix is known in the first equation of (4.1). However, note that we limited our investigation to the fields of integers Zp. Additionally, we left out the case of eigenvalues being in GF(pm), since the basic ideas presented here remain the same. The only thing that changes is the group size.

    We showed that the computational STR assumption only holds under the discrete logarithm assumption for any matrix Q. This fact means that we have to increase the public parameter p to an impractical bit size for the STR KEP to be secure. For example, we may consider a 2048-bit long prime p. However, such a large value defeats the original purpose of the STR KEP to achieve security without using operations with huge numbers. Furthermore, the decisional STR assumption does not hold, since it is enough to find the canonical form of Kδ. This fact means that an attacker can see certain relations between the publicly-known matrix Q and the user's public key.

    All in all, we can see that for the algebraic structures considered here, the STR KEP is not quantum-safe. Therefore, future investigations may involve searching for other algebraic structures (commuting or not) where the canonical form of the matrix is either undefined or hard to find. However, as of now, it is not clear if such structures exist.

    The author declares he has not used Artificial Intelligence (AI) tools in the creation of this article.

    The author declares no conflict of interest.



    [1] I. Anshel, M. Anshel, D. Goldfeld, An algebraic method for public-key cryptography, Math. Res. Lett., 6 (1999), 287–291, https://doi.org/10.4310/MRL.1999.v6.n3.a3 doi: 10.4310/MRL.1999.v6.n3.a3
    [2] K. Ko, S. Lee, J. Cheon, J. W. Han, J. S. Kang, C. Park, New public-key cryptosystem using braid groups, In: M. Bellare, Advances in cryptology-CRYPTO 2000, Springer, 2000,166–183. https://doi.org/10.1007/3-540-44598-6_10
    [3] V. Shpilrain, A. Ushakov, The conjugacy search problem in public key cryptography: unnecessary and insufficient, Appl. Algebra Eng. Commun. Comput., 17 (2006), 285–289, http://doi.org/10.1007/s00200-006-0009-6 doi: 10.1007/s00200-006-0009-6
    [4] E. Sakalauskas, P. Tvarijonas, A. Raulynaitis, Key agreement protocol (KAP) using conjugacy and discrete logarithm problems in group representation level, Informatica, 18 (2007), 115–124. http://doi.org/10.15388/Informatica.2007.167 doi: 10.15388/Informatica.2007.167
    [5] M. Eftekhari, A Diffie-Hellman key exchange using matrices over non-commutative rings, Groups Complexity Cryptology, 4 (2012), 167–176. http://doi.org/10.1515/gcc-2012-0001 doi: 10.1515/gcc-2012-0001
    [6] M. Sracic, Quantum circuits for matrix multiplication, Comput. Sci. Phys. Math., 2011.
    [7] A. Myasnikov, A. Ushakov, Quantum algorithm for discrete logarithm problem for matrices over finite group rings, Groups Complexity Cryptology, 6 (2014), 31–36. http://doi.org/10.1515/gcc-2014-0003 doi: 10.1515/gcc-2014-0003
    [8] A. Myasnikov, A. Ushakov, Cryptanalysis of matrix conjugation schemes, J. Math. Cryptology, 8 (2014), 95–114. http://doi.org/10.1515/jmc-2012-0033 doi: 10.1515/jmc-2012-0033
    [9] A. Pandey, I. Gupta, D. K. Singh, On the security of DLCSP over GLn(Fq[Sr]), Appl. Algebra Eng. Commun. Comput., 34 (2023), 619–628. http://doi.org/10.1007/s00200-021-00523-6 doi: 10.1007/s00200-021-00523-6
    [10] D. Boneh, V. Shoup, A graduate course in applied cryptography, Draft 0.5, 2023.
    [11] P. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM Rev., 41 (1999), 303–332. http://doi.org/10.1137/S0097539795293172 doi: 10.1137/S0097539795293172
  • Reader Comments
  • © 2025 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(444) PDF downloads(67) Cited by(0)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog