A New Key-Agreement-Protocol
A new 4-pass Key-Agreement Protocol is presented. The security of the protocol mainly relies on the existence of a (polynomial-computable) One-Way-Function and the supposed computational hardness of solving a specific system of equations.
š” Research Summary
The paper introduces a fourāpass keyāagreement protocol that relies on a publicly agreed matrixāÆCāFā^{nĆn}, a primeāÆp of size roughly 2ānāÆlogāÆn, and a polynomialātime computable injective oneāway functionāÆh:Fāā{0,1}^m. Alice and Bob each pick a secret field element (α for Alice, β for Bob), n secret bits (tāā¦tā and sāā¦sā), and a secret permutation (Ļ for Alice, Ļ for Bob).
In the first round Alice sends μ_j = Ī£_i t_iĀ·c_{i,j} + Ļ(j)·α for j=1ā¦n. In the second round Bob sends ν_i = Ī£_j s_jĀ·c_{i,j} + Ļ(i)·β for i=1ā¦n together with Ļ_A = Ī£_j s_j·μ_j. In the third round Alice computes Ļ_B = Ī£_i t_i·ν_i and, for every k in the range 0ā¦n(nā1)/2, sends the hash values h(Ļ_Aākα) together with Ļ_B. In the final round Bob computes h(Ļ_Bālβ) for every l in the same range, finds a pair (kā,lā) such that h(Ļ_Aākāα)=h(Ļ_Bālāβ), and sends kā to Alice. Both parties then obtain the common secret g = Ļ_Aākāα = Ļ_Bālāβ.
Correctness follows from the identities Ļ_A = Ī£_{i,j} t_i s_j c_{i,j} + α·kā² and Ļ_B = Ī£_{i,j} t_i s_j c_{i,j} + β·lā², where kā² and lā² lie in the prescribed range, guaranteeing at least one matching pair. The computational cost is dominated by O(n²) field operations and O(n²āÆlogāÆn) time for sorting the hash lists; evaluating h is assumed to take Ī©(logāÆp) elementary steps.
Security is claimed to rest on two hard problems: (1) inverting the injective oneāway function h, and (2) solving a system of equations that essentially forms an ultraāhighādensity knapsack together with hidden permutations Ļ and Ļ. The authors define āChallengeāÆ1ā: given all public data (the μ_j, ν_i, Ļ_A, Ļ_B, the list of h(Ļ_Aākα) values, and kā), compute g. They argue heuristically that any algorithm must explore roughly 2^{εānāÆlogāÆn} possibilities for the secret bits t_i (or equivalently for the permutations), because the knapsack equation Ļ_B = Ī£_i t_i ν_i admits about 2^{nālogāÆp} solutions and each guessed permutation adds only a linear number of extra equations, leaving an exponential number of candidate assignments. Consequently they conjecture a lower bound of Ī©(2^{εānāÆlogāÆn}) operations for any attack.
However, the paper provides no formal reduction, no concrete lowerābound proof, and no experimental evidence. Ultraāhighādensity knapsack instances are known to be vulnerable to latticeābasis reduction (LLL, BKZ) and often become easier as density increases, contrary to the authorsā intuition. The hiddenāpermutation component resembles the āhidden permutationā or āpermuted subsetāsumā problems, which have been attacked by algebraic or statistical methods in related settings. Moreover, the security of h is only assumed; without explicit collision resistance or preāimage resistance guarantees, an adversary could exploit birthday attacks on the hash lists to find matching values faster than the claimed exponential bound.
In summary, while the protocol presents an interesting fourāround structure and a novel combination of linear algebraic operations with a hashābased matching step, its security foundation is weak. The reliance on an uncharacterized oneāway function and on the presumed hardness of solving an ultraāhighādensity knapsack with hidden permutations lacks rigorous justification. Existing cryptanalytic techniques suggest that the protocol may be vulnerable to lattice attacks, permutation recovery, or hash collisions, and the claimed exponential security margin is not substantiated. Further work would need to provide a solid reduction to a wellāstudied hard problem, a precise analysis of the oneāway functionās properties, and concrete parameter recommendations before the scheme could be considered for practical deployment.
Comments & Academic Discussion
Loading comments...
Leave a Comment