Re: [saag] CFRG Presentation on Algebraic Eraser
"Derek Atkins" <derek@ihtfp.com> Wed, 25 March 2015 14:37 UTC
Return-Path: <derek@ihtfp.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 78D9E1A1B6A for <saag@ietfa.amsl.com>; Wed, 25 Mar 2015 07:37:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W2o1oMutetUV for <saag@ietfa.amsl.com>; Wed, 25 Mar 2015 07:37:27 -0700 (PDT)
Received: from mail2.ihtfp.org (mail2.ihtfp.org [IPv6:2001:4830:143:1::3a11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DC1F01A1BA3 for <saag@ietf.org>; Wed, 25 Mar 2015 07:37:09 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail2.ihtfp.org (Postfix) with ESMTP id 43156E2036; Wed, 25 Mar 2015 10:37:08 -0400 (EDT)
Received: from mail2.ihtfp.org ([127.0.0.1]) by localhost (mail2.ihtfp.org [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 31385-07; Wed, 25 Mar 2015 10:37:06 -0400 (EDT)
Received: by mail2.ihtfp.org (Postfix, from userid 48) id 4D398E2038; Wed, 25 Mar 2015 10:37:06 -0400 (EDT)
Received: from 31.133.176.247 (SquirrelMail authenticated user warlord) by mail2.ihtfp.org with HTTP; Wed, 25 Mar 2015 10:37:06 -0400
Message-ID: <278d67722706f326a5676f18c862dcf8.squirrel@mail2.ihtfp.org>
In-Reply-To: <CACsn0ck5TxifkjqfoncgWs3gt=ir7EsfNUedPfYBdxX_wkVveA@mail.gmail.com>
References: <d8a2cd9db03b3cd945ae5af5bff1b06a.squirrel@mail2.ihtfp.org> <CACsn0ck5TxifkjqfoncgWs3gt=ir7EsfNUedPfYBdxX_wkVveA@mail.gmail.com>
Date: Wed, 25 Mar 2015 10:37:06 -0400
From: Derek Atkins <derek@ihtfp.com>
To: Watson Ladd <watsonbladd@gmail.com>
User-Agent: SquirrelMail/1.4.22-14.fc20
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
X-Virus-Scanned: Maia Mailguard 1.0.2a
Archived-At: <http://mailarchive.ietf.org/arch/msg/saag/-sFa98thD7Axrhw_qOIYe0FEH5s>
Cc: "saag@ietf.org" <saag@ietf.org>
Subject: Re: [saag] CFRG Presentation on Algebraic Eraser
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Mar 2015 14:37:29 -0000
Hi, On Wed, March 25, 2015 10:17 am, Watson Ladd wrote: > On Tue, Mar 24, 2015 at 8:53 PM, Derek Atkins <derek@ihtfp.com> wrote: >> Hi, >> >> On Wednesday in CFRG my colleague and I are presenting the Algebraic >> Eraser, a public key crypto system targeted at embedded, low-resource, >> IoT >> systems that performs 70-200x better than ECC in time and power >> consumption. If you're at all interested in seeing viable, performant >> public key crypto on extremely constrained devices I encourage you to >> attend CFRG at 1pm on Wednesday. >> >> The abstract of the talk: >> >> The Algebraic Eraser (AE), introduced by Anshel, Anshel, Goldfeld, and >> Lemieux in 2006, is a key agreement protocol for public-key cryptography >> which was designed to be suitable for implementation on low-cost >> platforms >> with constrained computational resources, such as RFID, NFC, and other >> platforms associated with the "Internet of Things." One novel feature >> of >> the protocol is that its complexityscales linearly with the desired >> security, unlike other asymmetric methods such as RSA and ECC. In this >> talk we give an overview of the protocol and present recent hardware >> timing data comparing the performance of AE with ECC. > > This protocol appears to be based on conjugation in the braid group, > with some variations. I've seen http://arxiv.org/pdf/0801.4786v1.pdf > attacking this proposal. Are there other analyses we should be looking > at? Sure. You can look at http://arxiv.org/pdf/1202.0598v1.pdf and http://arxiv.org/pdf/1105.1141v1.pdf which talk to the two proposed attacks and show how they don't actually work. Thanks, > Sincerely, > Watson Ladd -derek -- Derek Atkins 617-623-3745 derek@ihtfp.com www.ihtfp.com Computer and Internet Security Consultant
- [saag] CFRG Presentation on Algebraic Eraser Derek Atkins
- Re: [saag] CFRG Presentation on Algebraic Eraser Ben Laurie
- Re: [saag] CFRG Presentation on Algebraic Eraser Yoav Nir
- Re: [saag] CFRG Presentation on Algebraic Eraser Watson Ladd
- Re: [saag] CFRG Presentation on Algebraic Eraser Derek Atkins
- Re: [saag] CFRG Presentation on Algebraic Eraser Derek Atkins
- Re: [saag] CFRG Presentation on Algebraic Eraser Derek Atkins
- Re: [saag] CFRG Presentation on Algebraic Eraser Viktor Dukhovni
- Re: [saag] CFRG Presentation on Algebraic Eraser Rene Struik