Journal of Mathematical Cryptology (Dec 2020)

Attack on Kayawood protocol: uncloaking private keys

  • Kotov Matvei,
  • Menshov Anton,
  • Ushakov Alexander

DOI
https://doi.org/10.1515/jmc-2019-0015
Journal volume & issue
Vol. 15, no. 1
pp. 237 – 249

Abstract

Read online

We analyze security properties of a two-party key-agreement protocol recently proposed by I. Anshel, D. Atkins, D. Goldfeld, and P. Gunnels, called Kayawood protocol. At the core of the protocol is an action (called E-multiplication) of a braid group on some finite set. The protocol assigns a secret element of a braid group to each party (private key). To disguise those elements, the protocol uses a so-called cloaking method that multiplies private keys on the left and on the right by specially designed elements (stabilizers for E-multiplication).

Keywords