Paper 2016/205

Addressing the Algebraic Eraser Diffie--Hellman Over-the-Air Protocol

Derek Atkins and Dorian Goldfeld

Abstract

The Algebraic Eraser Diffie-Hellman (AEDH) protocol, first introduced in 2005 as a key agreement and authentication protocol, has been proposed as a standard in ISO JTC-1/SC-31 (29167-20) to protect various communication protocols like RFID, NFC, or Bluetooth for devices associated with ISO-18000 and the Internet of Things. A recent paper by M.J.B. Robshaw and Simon R Blackburn claims to recover sufficient data to impersonate a device or, with a bit more work, recover the private keys of a device if an attacker uses the draft 29167-20 protocol and gains direct access to the resulting shared secret computation. This paper shows that simply adding a Hash or a Message Authentication Code (MAC) to the proposed authentication protocol overcomes the purported attacks. These simple standard enhancements thwart all of these attacks; that is, attacks of this nature fail. As the 29167-20 draft is currently a work item under active development within the ISO process, all these attacks would normally have been addressed in the working group, and no AEDH protocol in the public domain currently transmits the computed shared secret. Therefore, contrary to the conclusion of Robshaw and Blackburn, a simple addition to the draft protocol, similar in nature to protections in other protocols like TLS, makes the AEDH protocol perfectly suitable for authentication of passive tags and other low-power, constrained devices.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint. MINOR revision.
Keywords
Algebraic EraserGroup Theoretic CryptographyE-MultiplicationBraids
Contact author(s)
datkins @ securerf com
History
2016-02-25: received
Short URL
https://ia.cr/2016/205
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/205,
      author = {Derek Atkins and Dorian Goldfeld},
      title = {Addressing the Algebraic Eraser Diffie--Hellman Over-the-Air Protocol},
      howpublished = {Cryptology ePrint Archive, Paper 2016/205},
      year = {2016},
      note = {\url{https://eprint.iacr.org/2016/205}},
      url = {https://eprint.iacr.org/2016/205}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.