Abstract
We present a practical cryptanalysis of WalnutDSA, a digital signature algorithm trademarked by SecureRF. WalnutDSA uses techniques from permutation groups, matrix groups and braid groups, and is designed to provide post-quantum security in lightweight IoT device contexts. The attack given in this paper bypasses the E-Multiplication\(^{\text {TM}}\) and cloaked conjugacy search problems at the heart of the algorithm and forges signatures for arbitrary messages in approximately two minutes. We also discuss potential countermeasures to the attack.
You have full access to this open access chapter, Download conference paper PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
1 Introduction
Most of the cryptosystems in use today are based on two difficult problems: the integer factorization problem and the Discrete Logarithm Problem (DLP). Both of these problems can be solved efficiently by running Shor’s algorithm [1] on a sufficiently large quantum computer. As of now, such quantum computers do not exist, but organisations such as NIST and the NSA are striving for cryptosystems resilient to quantum attacks to prepare for the time when they become a reality [2,3,4].
The problem at the heart of Shor’s algorithms, the so-called hidden subgroup problem, can be solved in polynomial time on a quantum computer for any finite abelian group, but has so far appeared much harder in the case for non-abelian groups. Cryptography based on non-abelian groups is therefore considered an appealing direction for post-quantum cryptography. Braid groups have traditionally been used in non-abelian group based cryptography: for example, the Anshel-Anshel-Goldfeld (AAG) key-exchange protocol and the Diffie-Hellman-type key-exchange protocol are both based on the conjugacy search problem (or at least one of its variants) in a braid group [5, Sect. 1.6]. Today, more advanced protocols have evolved from these schemes.
SecureRF [6] is a corporation founded in 2004 specializing in security for the Internet of Things (IoT), i.e. devices with low processing power that require ultra-low energy consumption, whose partners include the US Air Force. WalnutDSA [7] is a digital signature algorithm developed by SecureRF that was presented at the NIST Lightweight Cryptography Workshop in 2016. SecureRF has collaborated with Intel [8] to develop an implementation of WalnutDSA on secure field-programmable gate arrays (FPGAs). Thus, WalnutDSA’s importance as a cryptosystem today is established, as corporations and government agencies push for security in a post-quantum world.
1.1 Our Contribution
We provide a universal forgery attack on WalnutDSA. Our attack does not require a signing oracle: in fact, having access to a small set of random message-signature pairs suffice. In principle, the security of WalnutDSA is based on the difficulty of reversing E-Multiplication and the cloaked conjugacy search problem [7, Problems 1, 2], but we go around this by reducing the problem of forging a WalnutDSA signature to an instance of the factorization problem in a non-abelian group (given a group element \(g \in G\) and a generating set \(\mathrm {\Gamma }\) for G, find a word w over \(\mathrm {\Gamma }\) such that \(w = g\)). While this problem is plausibly hard in general, we give an efficient algorithm for solving the particular instance occurring in this context. Given a couple of valid signatures on random messages, our attack can produce a new signature on an arbitrary message in approximately two minutes. We also discuss countermeasures to prevent this attack.
Responsible Disclosure Process. Since WalnutDSA is advertised as a security product by SecureRF, we notified its authors of our findings before making them available to the public. We informed them by email on October 17th 2017 with full details of our attack. They acknowledged the effectiveness of our attack on October 19th 2017, and we agreed to postpone our publication until November 26th 2017.
Two countermeasures are discussed here, namely checking the signature length and increasing the parameters. SecureRF have communicated to us that they have always had a limit on signature lengths in their product offerings, and that the increase in parameter sizes we suggest may still allow for many applications in devices with limited computing power. These two countermeasures can prevent our attack for now. As we briefly argue in Sect. 5 below, improved versions of the attack might be able to defeat them, but we leave these to further work.
In reaction to our attack, SecureRF have also developed a new version of WalnutDSA using two private keys (instead of conjugation), such that Proposition 4 of this paper fails to apply.
1.2 Related Work
Ben-Zvi et al. [9] provide a complete attack on a version of SecureRF’s Algebraic Eraser scheme, a public key encryption protocol also based on E-Multiplication. Other attacks on the Algebraic Eraser include those by Myasnikov and Ushakov [10], which is a length-based attack on SecureRF’s specific realisation of the general scheme, and by Kalka et al. [11], which is a cryptanalysis for arbitrary parameter sizes.
Other important work includes Garside’s and Birman et al. [12, 13] on solving the conjugacy search problem in braid groups using Summit Sets, the Garside normal form [12] and Dehornoy Handle Reduction [14].
Other instances of factorization problems in non-abelian groups have been solved previously, in both cryptographic contexts [15,16,17] and in mathematical literature [18]. The algorithms we develop in this paper for factorization in \(\mathrm{GL}\,_N(\mathbb {F}_q)\) belongs to the family of subgroup attacks [19].
1.3 Outline
In Sect. 2, we provide the definition of security for signature schemes, and introduce the factorization problem as well as some preliminary results about braid groups. In Sect. 3, we introduce the WalnutDSA protocol. In Sect. 4, we provide a cryptanalysis of WalnutDSA by first reducing the problem to a factorization problem in \(\mathrm{GL}\,_N(\mathbb {F}_q)\) (Sect. 4.1) and then solving it (Sect. 4.2). In Sect. 5, we describe possible countermeasures to prevent the attack. We conclude the paper in Sect. 6.
2 Preliminaries
2.1 Security Definition
The standard security definition for signatures is existential unforgeability under chosen message attacks [20, Introduction]. An adversary can ask for polynomially many signatures of messages of its choice to a signing oracle. The attack is then considered successful if the attacker is able to produce a valid pair of message and signature for a message different from those queried to the oracle. We will show that the version of WalnutDSA proposed in [7] is not resistant to this kind of attack and propose a modification to the scheme that fixes this weakness.
Definition 1
A signature scheme \(\mathrm {\Pi }=({\textsf {Gen}}\,,{\textsf {Sign}}\,,{\textsf {Verify}}\,)\) is said to be existentially unforgeable under adaptive chosen-message attacks (or secure, for short) if for all probabilistic polynomial time adversaries \(\mathcal {A}\) with access to \({\textsf {Sign}}\,_{\textsc {sk}}(\cdot ),\)
where \(\mathcal {M} = \{ m_1, \dots , m_k \}\) is the set of messages queried by \(\mathcal {A}\) to the oracle, and \(k=\#\mathcal M \) is polynomial in the security parameter \(\lambda \).
For our cryptanalysis, the \(m_i\) can actually be random messages, leading to a stronger attack.
2.2 Braid Groups
For \(N \ge 2,\) the braid group [5] on N strands, denoted \(B_N\), is a group with presentation

where the \(b_i\) are called Artin generators. There are other presentations for the braid group, but unless otherwise stated, we will use the definition provided in (1) and “generators” will refer to the Artin generators. Geometrically, the elements of a braid group are the equivalence classes of N strands under ambient isotopy, and the group operation is concatenation of the N strands. More precisely, the generator \(b_i\) corresponds to the \((i+1)\)-th strand crossing over the i-th strand. Note that there is a natural homomorphism from \(B_N\) onto the symmetric group \(S_N\): if \(\beta = b_{i_1} \cdots b_{i_k},\) then the permutation induced by \(\beta \) is precisely
where \((i_j,\; i_j + 1)\) is the standard transposition in \(S_N.\)
Notation
Let be the above map, which sends a braid to its induced permutation.
Braids that induce trivial permutations are called pure braids. The set of pure braids is exactly the kernel of the homomorphism \(\mathfrak {p}\), hence it forms a normal subgroup of \(B_N\). We will denote this subgroup by \(PB_N\).
Garside Normal Form. A normal form of an element in a group is a canonical way to represent the element. One known normal form for braid groups is Garside normal form. The details can be found in Appendix A. We can compute the Garside normal form of a braid with complexity \(O(|{W}|^2N \log {N})\) where \(|{W}|\) is the length of the word in Artin generators [21]. Such a normal form is important for WalnutDSA, but the cryptanalysis we provide in Sect. 4 is independent of the choice of it.
The Colored Burau Representation. Let q be an arbitrary prime power, and let \(\mathbb {F}_q\) be the finite field with q elements. Let \(\mathbb {F}_q[t_1^{\pm 1}, \ldots , t_{N}^{\pm 1}]\) be the ring of Laurent polynomials with coefficients in \(\mathbb {F}_q.\) Note that there is a natural action of \(S_N\) on \(\mathrm{GL}\,_N\left( \mathbb {F}_q[t_1^{\pm 1}, \ldots , t_{N}^{\pm 1}]\right) \), where a permutation acts on a Laurent polynomial by permuting its variables. In other words, we have an action \(f \mapsto {}^\sigma \! f\) where \(f(t_1,\ldots ,t_N)\) is mapped to \(f(t_{\sigma (1)}, \ldots , t_{\sigma (N)}).\) Similarly, a permutation may act on a matrix M in \(\mathrm{GL}\,_N\left( \mathbb {F}_q[t_1^{\pm 1}, \ldots , t_{N}^{\pm 1}]\right) \) entrywise, and we will denote the image of M under this action as \({}^\sigma \! M.\)
Proposition 1
There exists a group homomorphism, called the colored Burau representation [7],

where \(\rtimes \) denotes the semidirect product.
Let \(\mathfrak {m}\) be the projection of \(\mathrm {\Phi }\) on \(\mathrm{GL}\,_N\left( \mathbb {F}_q[t_1^{\pm 1}, \ldots , t_{N}^{\pm 1}]\right) \). Then \(\mathrm {\Phi }\) is defined as follows:
-
For the generator \(b_1 \in B_N\), define
$$ \mathfrak {m}(b_1) = \begin{pmatrix} -t_1 &{} 1 &{} &{} &{} \\ &{}\ddots &{}&{}&{}\\ &{}&{} 1 &{}&{}\\ &{}&{}&{} \ddots &{} \\ &{}&{}&{}&{} 1 \end{pmatrix}, $$and
$$ \mathfrak {m}(b_1^{-1}) = \begin{pmatrix} -\frac{1}{t_2} &{} \frac{1}{t_2} &{} &{} &{} \\ &{}\ddots &{}&{}&{}\\ &{}&{} 1 &{}&{}\\ &{}&{}&{} \ddots &{} \\ &{}&{}&{}&{} 1 \end{pmatrix}. $$ -
For \( 2 \le i < N, \) define
$$ \mathfrak {m}(b_i) = \begin{pmatrix} 1&{}&{}&{}&{}&{}\\ &{}\ddots &{}&{}&{}&{}\\ &{}t_i&{}-t_i&{}1&{}&{}\\ &{}&{}&{}\ddots &{}&{}\\ &{}&{}&{}&{}&{}1 \end{pmatrix}, $$where the \(-t_i\) occurs in the i-th row. Also define
$$ \mathfrak {m}(b_i^{-1}) = \begin{pmatrix} 1&{}&{}&{}&{}&{}\\ &{}\ddots &{}&{}&{}&{}\\ &{}1&{}-\frac{1}{t_{i+1}}&{}\frac{1}{t_{i+1}}&{}&{}\\ &{}&{}&{}\ddots &{}&{}\\ &{}&{}&{}&{}&{}1 \end{pmatrix}. $$ -
Define
-
Given generators \(b_i^{\pm 1}, b_j^{\pm 1},\) we define \(\mathrm {\Phi }(b_i^{\pm 1}b_j^{\pm 1})\) to be
$$\begin{aligned} \big (\mathfrak {m}(b_i^{\pm 1}), \mathfrak {p}(b_i)\big ) \cdot \big (\mathfrak {m}(b_j^{\pm 1}), \mathfrak {p}(b_j) \big ) = \left( \mathfrak {m}(b_i^{\pm 1}) \cdot \big ({}^{\mathfrak {p}(b_i)}\!\mathfrak {m}(b_j^{\pm 1})\big ), \mathfrak {p}(b_i)\mathfrak {p}(b_j) \right) . \end{aligned}$$For a general braid \(\beta ,\) we extend this definition inductively to define \(\mathrm {\Phi }(\beta ).\)
Note that \(\mathrm {\Phi }\) and \(\mathfrak {p}\) are homomorphisms, but \(\mathfrak {m}\) is not a homomorphism in general. However, the following lemma shows that its restriction to pure braids is a homomorphism.
Lemma 1
Let \(\phi : PB_N \rightarrow \mathrm{GL}\,_N\left( \mathbb {F}_q[t_1^{\pm 1}, \ldots , t_{N}^{\pm 1}]\right) \) be the restriction map of \(\mathfrak {m}\) to \(PB_N\). This map is a group homomorphism.
Proof
Let \(\beta _1\), \(\beta _2\) be pure braids. Then, if \(\mathrm {Id}_{S_N}\) is the identity permutation,
and so \(\phi \) is indeed a homomorphism. \(\square \)
Previous Cryptosystems Based on Braid Groups. A problem that is generally difficult to solve in non-abelian groups is the conjugacy search problem (CSP), i.e. given conjugate elements \(u,w \in B_N,\) find \(v \in B_N\) such that \(w = v^{-1}uv.\) This motivated the development of several cryptosystems based on the CSP in braid groups, some of which are given in [5]. Techniques such as summit sets [13, 22, 23], length-based attacks [24,25,26], and linear representations [27,28,29], have been developed to attack the CSP in braid groups however, and so those cryptosystems have been rendered impractical. The design of WalnutDSA uses a variant of the CSP, the cloaked conjugacy search problem, to avoid these attacks.
2.3 Factorization Problem in Non-Abelian Groups
Factorization Problem in Groups. Let G be a group, let \(\mathrm {\Gamma } =\{g_1,\ldots ,g_\gamma \}\) be a generating set for G, and let \(h\in G\). Find a “small” integer L and sequences \((m_1,\ldots ,m_L)\in \{1,\ldots ,\gamma \}^L\) and \((\epsilon _1,\ldots ,\epsilon _L)\in \{\pm 1\}^L\) such that
Depending on the context, “small” may refer to a concrete practical size, or it may mean polynomial in \(\log |G|\). The existence of products of size polynomial in \(\log |G|\) for any finite simple non-abelian group, any generating set, and any element h was conjectured by Babai and Seress [30]. This conjecture has attracted considerable attention from the mathematics community in the last fifteen years, and has now been proven for many important groups [31, 32].
The potential hardness of the factorization problem for non-abelian groups underlies the security of Cayley hash functions [33]. The problem was solved in the particular cases of the Zémor [34, 35], Tillich-Zémor [15, 17, 36], and Charles-Goren-Lauter [16, 37, 38] hash functions, and to a large extent in the case of symmetric and alternating groups [18], but it is still considered a potentially hard problem in general. Over cyclic groups, this problem is known to be equivalent to the discrete logarithm problem when removing the constraint on L [39]. We refer to [19] for a more extensive discussion of the factorization problem and its connection with Babai’s conjecture.
The instance of the factorization problem that appears in our attack is over \(GL_N(\mathbb {F}_q)\), the general linear group of rank N over the finite field \(\mathbb {F}_q\). Our solution for it exploits the particular subgroup structure of this group.
3 WalnutDSA
WalnutDSA\(^{\text {TM}}\) is a digital signature scheme proposed by Anshel et al. in [7], based on braid groups, E-Multiplication\(^{\text {TM}}\) and cloaked conjugacy.
3.1 E-Multiplication
Let \(B_N\) be the braid group on N braids, let q be a prime power and let \(\mathbb {F}_q^\times \) denote the non-zero elements of the finite field \(\mathbb F_q\). Define a sequence of “T-values”:
Given the T-values, we can evaluate any Laurent polynomial \(f \in \mathbb {F}_q[t_1^{\pm 1}, \ldots , t_{N}^{\pm 1}]\) to produce an element of \(\mathbb F_q\):

We can similarly evaluate any matrix M in \(\mathrm{GL}\,_N\left( \mathbb {F}_q[t_1^{\pm 1}, \ldots , t_{N}^{\pm 1}]\right) \) entrywise to produce a matrix \(M{\big \downarrow }_{\tau }\) in \(\mathrm{GL}\,_N(\mathbb {F}_q)\).
E-Multiplication [40] is a right action, denoted by \(\star \), of the colored Burau group \(\mathrm{GL}\,_N\left( \mathbb {F}_q[t_1^{\pm 1}, \ldots , t_{N}^{\pm 1}]\right) \rtimes S_N\) on \(\mathrm{GL}\,_N(\mathbb {F}_q)\times S_N\). In other words, it takes two ordered pairs
and produces another ordered pair
in \(\mathrm{GL}\,_N(\mathbb {F}_q)\times S_N.\)
E-Multiplication is defined inductively. For a single generator \(b_i\),

For a general braid \(\beta = b_{i_1}^{\epsilon _1} \cdots b_{i_k}^{\epsilon _k},\)
where the successive E-Multiplications are performed left to right. This is well-defined, as it is independent of how we write \(\beta \) in terms of the generators [7, Sect. 3].
Lemma 2
For any pure braid \(\beta \), any permutation \(\sigma \), and any \(\tau \in (\mathbb {F}_q^\times )^N\), \(\Big (\big (^\sigma \!\mathfrak {m}(s_i)\big ){\big \downarrow }_{\tau }\Big )^{-1} = \left( ^\sigma \!\mathfrak {m}(s_i^{-1})\right) {\big \downarrow }_{\tau }\).
Proof
Let \(M \in \mathrm{GL}\,_N(\mathbb {F}_q)\) and let \(\sigma \in S_N\). Then,
which implies
\(\square \)
Notation
We will follow the notation in [7] and write
instead of \((M, \sigma _0) \star \big (\mathfrak {m}(\beta ), \mathfrak {p}(\beta )\big )\) for a braid \(\beta \in B_N.\)
Notation
For \(\xi = (M,\sigma )\) in \(\mathrm{GL}\,_N(\mathbb {F}_q)\times S_n,\) let \(\mathfrak {m}(\xi )\) denote the matrix part of \(\xi ,\) i.e. \(\mathfrak {m}(\xi ) = M.\)
3.2 Key Generation
Before the signer generates the private-/public-key pair, some public parameters are fixed:
-
An integer N and the associated braid group \(B_N\);
-
A rewriting algorithm \(\mathcal {R}:B_N \rightarrow B_N\), such as the Garside normal form;
-
A prime power q defining a finite field \(\mathbb {F}_q\) of q elements;
-
Two integers \(1< a< b < N\);
-
T-values \(\tau = ( \tau _1, \tau _2, \ldots , \tau _N ) \in (\mathbb {F}_q^\times )^N\) with \(\tau _a = \tau _b = 1\);
-
An encoding function \(\mathcal {E}: \{0,1\}^* \rightarrow B_N\) taking messages to braids.
The signer then chooses a random freely-reduced braid \(\textsc {sk}\in B_N\) (of the desired length to prevent brute force attacks from being effective) to be the private-key, and calculates the public-key as
Notation
We follow the notation in [7] and write for a braid \(\beta \in B_N.\)
In [7], it is recommended to use \(N \ge 8\) and \(q \ge 32\) for the public parameters.
3.3 Message Encoding
To sign a message \(m \in \{0,1\}^*\) using WalnutDSA, it must first be encoded as a braid \(\mathcal {E}(m) \in B_N\). WalnutDSA achieves this by encoding messages as pure braids: given a message m, it is first hashed using a cryptographically secure hash function \(H: \{0,1\}^* \rightarrow \{0,1\}^{4\kappa }\), where \(\kappa \ge 1\). The paper [7] does not provide a formal definition of “cryptographically secure”, but we believe that the intended meaning is that of a “random oracle” [41], and in this paper we will treat the hash function as such. The bitstring H(m) is then encoded as a pure braid by noting that the \(N-1\) braids
are pure braids that freely generate a subgroup of \(B_N\) [42]. Fix four of these generators, say \(g_{k_1, N}, g_{k_2, N}, g_{k_3, N}, g_{k_4, N}\) for \(1\le k_i \le N-1\), and define
Each 4-bit block of H(m) can then be mapped to a unique power of one of these generators: the first two bits determine the generator \(g_{k_{i}, N}\) to use, while the last two bits determine the power \(1 \le i \le 4\) to raise the generator to. The encoded message \(\mathcal {E}(m) \in C\) is then defined to be the freely reduced product of the \(\kappa \) powers of the \(g_{k_i,N}\) obtained via the above process.
3.4 Cloaking Elements
WalnutDSA defines and uses “cloaking elements” to avoid being reduced to the conjugacy search problem, reducing instead to the cloaked conjugacy search problem. A braid \(\beta \in B_N\) is said to be a cloaking element of \((M,\sigma ) \in \mathrm{GL}\,_N(\mathbb {F}_q)\times S_N\) if \((M,\sigma ) \star \beta = (M,\sigma )\). The set of cloaking elements of \((M,\sigma )\) is then the stabilizer of \((M,\sigma )\) under the E-Multiplication action, and so forms a subgroup of \(B_N\).
Lemma 3
Any cloaking element is a pure braid.
Proof
Let \(\beta \in B_N\) be a cloaking element of \((M, \sigma ) \in \mathrm{GL}\,_N(\mathbb {F}_q)\times S_N\). Then
which implies that \(\mathfrak {p}(\beta ) = \mathrm {Id}_{S_N}\). \(\square \)
The authors of WalnutDSA provide a method of generating cloaking elements [7, Proposition 4.2], which we recap here for the reader’s convenience.
Proposition 2
Fix integers \(N \ge 2\) and \(1<a<b<N\). Assume that \(\tau _a = \tau _b = 1\). Let \(M \in \mathrm{GL}\,_N(\mathbb {F}_q)\) and \(\sigma \in S_N\). Then a cloaking element \(\beta \) of \((M,\sigma )\) is given by \(\beta = wb_i^2w^{-1}\) where \(b_i\) is any Artin generator and \(w \in B_n\) is any braid such that the associated permutation \(\mathfrak {p}(w)\) satisfies
Remark 1
A detailed algorithm for constructing cloaking elements is not provided. In particular, no algorithm to generate w is given. Hence, in our implementation, we generate it in the following way:

We stress that our attack works independently of the way cloaking elements \(\beta \) are generated.
3.5 Signing
Signing. To sign a message m, the signer does as follows:
-
1.
Compute \(\mathcal {E}(m)\) as in Sect. 3.3;
-
2.
Generate cloaking elements v for \((\mathrm {Id}_N, \mathrm {Id}_{S_N})\) and \(v_1, v_2\) for \((\mathrm {Id}_N, \mathrm {Id}_{S_N}) \star \textsc {sk}\);
-
3.
Compute \(s = \mathcal {R}(v_2 \cdot \textsc {sk}^{-1}\cdot v\cdot \mathcal {E}(m) \cdot \textsc {sk}\cdot v_1)\);
-
4.
Output (m, s), the final signature for the message.
The cloaking elements are necessary to preclude the possiblity of recovering for \(\textsc {sk}\) by solving the CSP (any solution to the CSP is sufficient), since both s and \(\mathcal {E}(m)\) are publicly available (the latter after some computation).
Proposition 3
For any message m, its signature
is a pure braid.
Proof
Recall that \(\mathcal {E}(m)\) is a product of pure braids and is, therefore, a pure braid. Moreover, by Lemma 3, \(v, v_1 \text{ and } v_2\) are pure braids. Hence, the induced permutation \(\mathfrak {p}(s)\) of s is:
\(\square \)
3.6 Verifying
Verifying. To verify a signature (m, s), the verifier does as follows:
-
1.
Compute \(\mathcal {E}(m)\);
-
2.
Compute \(\mathrm{Pub}\,\big (\mathcal {E}(m)\big ) = (\mathrm {Id}_N, \mathrm {Id}_{S_N}) \star \mathcal {E}(m)\).
The signature is then valid if and only if the verification equation
holds.
Lemma 4
A message-signature pair (m, s), generated as in Sect. 3.5 satisfies the verification process.
Proof
We have that
where
-
(1) holds since \(v_2\) cloaks \(\textsc {pk}= (\mathrm {Id}_N, \mathrm {Id}_{S_N}) \star \textsc {sk}\);
-
(2) holds since v cloaks \( (\mathrm {Id}_N, \mathrm {Id}_{S_N}) \).
Looking at the matrix parts of the above equality, we see that
where
-
(3) holds since \(\mathcal {E}(m)\) is a pure braid
-
(4) holds since \(v_1\) cloaks \(\textsc {pk}= (\mathrm {Id}_N, \mathrm {Id}_{S_N}) \star \textsc {sk}\).
\(\square \)
4 Practical Cryptanalysis of WalnutDSA
In this section we present a universal forgery attack on WalnutDSA. The structure of the section is as follows: in Sect. 4.1, we show that an attacker can produce a signature for a new message if they are able to solve a factorization problem over \(\mathrm{GL}\,_N(\mathbb {F}_q)\). In Sect. 4.2, we present an algorithm solving this factorization problem by exploiting the subgroup structure of \(\mathrm{GL}\,_N(\mathbb {F}_q)\), and in Sect. 4.3, we describe a meet-in-the-middle approach which reduces the complexity of this attack. In Sect. 4.4, we analyze the complexity of our attack and provide some experimental results. Finally, we discuss further improvements to our attack in Sect. 4.5.
4.1 Reduction to the Factorization Problem
Let I be a finite indexing set. For each \(i \in I\), let \(m_i\) be a message and \(s_i\) be its signature generated as in Sect. 3.5. Define the set \(\mathcal {M} =\{(m_i, s_i) : i \in I \}\). Recall that for a braid \(\beta \), we define
where \(\mathrm {Id}_N\) is the identity matrix and \(\mathrm {Id}_{S_N}\) is the identity permutation.
Proposition 4
Let m be an arbitrary message. Let \(g_i = \mathfrak {m}\big (\mathrm{Pub}\,(\mathcal {E}(m_i))\big )\) for each \(i \in I\) and let \(h = \mathfrak {m}\big (\mathrm{Pub}\,(\mathcal {E}(m))\big )\). Suppose
Then \(s = \prod _{j=1}^L s_{i_j}^{\epsilon _{i_j}}\), the concatenation of the corresponding braids \(s_{i_j}^{\epsilon _{i_j}}\), is a valid signature for m.
Proof
Each pair in \(\mathcal {M}\) satisfies the verification equation:
Writing \(\sigma \) as \(\mathfrak {p}(\textsc {pk})\) and M as \(\mathfrak {m}(\textsc {pk})\), the above equation is equivalent to
where \(\tau = (\tau _1, \ldots , \tau _N)\) is the sequence of T-values. Also, by Proposition 3, each \(s_i^{\epsilon _i}\) is a pure braid, and so Lemma 2 applies. Hence, by taking the inverse of (2), we obtain
and so
By Lemma 1,
and hence,
Therefore s is a valid signature for m, as the above equation is equivalent to
the verification equation for (m, s). \(\square \)
4.2 Solution to the Factorization Problem
Let \(\mathrm {\Gamma } = \{ g_i \, | \, i \in I\}\). Following our discussion in Sect. 4.1, we want to express h as a short word over \(\mathrm {\Gamma }\). We first define the following chain of subgroups:
Definition 2
For \(k \in \{1, \ldots , 2N-2\},\) let
where
That is, for even k,

and for odd k,

where \(*\) is a column of length \(N-\frac{k+1}{2}\) and \(\lambda _i \in \mathbb {F}_q^{\times }\) for \(i \in \{1, \ldots , \lfloor \frac{k-1}{2} \rfloor \}.\)
Remark 2
Checking whether \(g \in \mathrm{GL}\,_N(\mathbb {F}_q)\) is in \(G_k\) for any k is straightforward given the characteristic shape of the matrices in each group.
Lemma 5
For any braid \(\beta \in B_N\), \(\mathfrak {m}\big (\mathrm{Pub}\,(\beta )\big ) \in G_1\).
Proof
Let \(G'_1\) be the subgroup of \(\mathrm{GL}\,_N\left( \mathbb {F}_q[t_1^{\pm 1}, \ldots , t_{N}^{\pm 1}]\right) \) consisting of matrices with their last row all zeroes except for the last entry, which is equal to 1. For each \(i \in \{1, \ldots , N-1\}\), \(\mathfrak {m}(b_i) \in G'_1\). Therefore, \(\mathfrak {m}(\beta ) \in G'_1\) and hence, \(\mathfrak {m}\big (\mathrm{Pub}\,(\beta )\big ) = \mathfrak {m}(\beta ){\big \downarrow }_\tau \in G_1\). \(\square \)
We also make use of the following assumption:
Assumption 1
For any k, a small set of random elements of \(G_k\) generates \(G_k\) with high probability.
This assumption is supported by [43] and our experiments.
Our algorithm aims to solve an instance of a factorization problem over \(G_1\). This is done in \(2N-2\) stages. The first \(2N-3\) stages are inductive: in stage k, we reduce the problem in \(G_k\) to an instance of the problem over the next subgroup \(G_{k+1}\). At the end of stage \(2N-3\), we have reduced the original problem to factorization problem over \(G_{2N-2}\), the diagonal subgroup. In the last stage of the algorithm, we reduce the factorization problem in \(G_{2N-2}\) to an easy case of the discrete logarithm problem over \(\mathbb {F}_q\) and a system of linear equations.
Let , let
, and let
. Further, for \(2 \le k \le 2N-2\), let \(\gamma _k\) be a positive integer and
. We will aim to produce \(\gamma _{k+1}\) elements of \(G_{k+1}\) in stage k, and we hope that these elements will generate \(G_{k+1}\), which we will need to reduce the factorization problem into the next subgroup. The integer \(L_k\) captures some information about the number of elements we need to consider from \(G_k\) before we find \(\gamma _{k+1}\) elements of \(G_{k+1}\): in our algorithm, the elements from \(G_{k}\) that we will consider will be words of some fixed length \(\mathcal {L}_k\) over some generating set of size \(\gamma _k\); by considering the relative sizes of \(G_k\) and \(G_{k+1}\), it then follows that \(\mathcal {L}_k\) should be \(L_k\).
Inductive Stages. In stage k \(\big (\mathrm{for} \, k \in \{1, \ldots , 2N-3\}\big )\), we will find a set and an element \(h_{k+1} \in G_{k+1}\), where \(g_i^{(k+1)}\) are words over \(\mathrm {\Gamma }_{k}\) and \(h_{k+1}\) is a product of \(h_k\) with a word over \(\mathrm {\Gamma }_{k}\).

Following Assumption 1, we expect that for large enough \(\gamma _k\), \(\mathrm {\Gamma }_{k}\) will be a generating set for \(G_k\). We therefore expect to be able to find \(\gamma _{k+1}\) elements in \(G_{k+1} \subset G_{k}\) given enough iterations of the loop. Moreover, \(h_kG_{k+1} \subset G_{k}\), and so we expect to be able to find \(h_{k+1}\) as well.
Remark 3
We see from the above algorithm that for all \(k \in \{1, \ldots , 2N-3\}\), we can write \(h_{k+1}\) as
Moreover, we can write any element in \(\mathrm {\Gamma }_{k+1}\) as a product of elements in \(\mathrm {\Gamma }_{k}\). Hence, we can recursively write \(h_{k+1}\) as a product of a word over \(\mathrm {\Gamma }_{1} = \mathrm {\Gamma }\) with \(h_1 = h\), i.e. we can express \(h_{k+1}\) as
In particular, we can express each element \(g_i^{(2N-2)} \in \mathrm {\Gamma _{2N-2}}\) as a word over \(\mathrm {\Gamma }\)
Final Stage. At the end of stage \(2N-3\), we will have a set
and an element \(h_{2N-2} \in G_{2N-2}\). Note that \(G_{2N-2}\) is the subgroup of diagonal matrices, and so all of the above elements are diagonal matrices as well.
We want to express \(h_{2N-2}\) as a word over \(\mathrm {\Gamma }_{2N-2}\). Since \(G_{2N-2}\) is abelian, this is equivalent to finding exponents \(v_1, \ldots , v_{\gamma _{2N-2}} \in \mathbb {Z}\) such that
Equally, (4) and (5) then allow us to rewrite the above equation as
an expression for h as a word over \(\mathrm {\Gamma }\), given that we can find the exponents \(v_i\). We describe how to find these exponents next.
Note that all the matrices on both sides of (6) are diagonal matrices. For each \(i \in \{0, \ldots , \gamma _{2N-2}\}\), let \(c_i = (\lambda _{i_1}, \ldots , \lambda _{i_{N-1}}, 1)\) be the sequence of diagonal entries in \(g_i^{(2N-2)}\), and let be the diagonal entries in \(h_{2N-2}\). Further, let \(\delta \) be a generator of \(\mathbb {F}_q^{\times }\). By solving the discrete logarithm problem over \(\mathbb {F}_q^{\times }\) (which is straightforward for small q), for each \(i \in \{1, \ldots , \gamma _{2N-2}\}\), and each \(j \in \{1, \ldots , {N-1}\}\), we can find \(e_{i_j}\) and \(u_j\) such that:
i.e., we are able to write all non-zero entries of the matrices in (6) as powers of \(\delta \). Finding the exponents \(v_i\) is then reduced to solving a system of linear equations over \(\mathbb {Z}_{q-1}\). More explicitly, for each \(i \in \{1, \ldots , \gamma _{2N-2}\}\), define \(c'_i = (e_{i_1}, \ldots , e_{i_{N-1}}, 1)\). Also, let \(c'= (u_1, \ldots , u_{N-1}, 1)\) and let \(D = (c'_1, \ldots , c'_{\gamma _{2N-2}})\), i.e., the matrix with \(i^{th}\) column equal to \(c'_i\). So (6) above is equivalent to the system of linear equations
which can be solved with standard linear algebra techniques.
4.3 Meet-in-the-Middle Approach
We can improve the recursive step of our attack as follows: instead of computing products of length \(L_k\) until we hit an element of \(G_{k+1}\), we compute pairs of products each of length \(\big \lfloor \frac{L_k}{2}\big \rfloor \) and then check for pairs which lie in the same coset of \(G_{k+1}\). This meet-in-the-middle approach will lead to a square root improvement on the complexity. In order to use this approach, we need an efficient method to check whether two elements are in the same coset of \(G_{k+1}\). The following lemma provides such a method.
Lemma 6
Let \(G_k\) for \(k \in \{1, \ldots , 2N-2\}\) be the subgroups in Definition 2, and let \(p, \, p' \in G_k\). Then
-
For odd k, \(p' \in pG_{k+1}\) if and only if the \((N-\frac{k+1}{2}+1)^{th}\) columns of p and \(p'\) are multiples of each other.
-
For even k, \(p' \in G_{k+1} p'\) if and only if the \((N-\frac{k}{2})^{th}\) rows of p and \(p'\) are multiples of each other.
Proof
Let k be odd, let h be any matrix in \(G_{k+1}\), and let \(r = N-\frac{k+1}{2}+1\). Note that the \(r^{th}\) column of h is zero except for the entry \(h_{r,r} \in \mathbb {F}_q^{\times }\). Finally, let \(p, p' \in G_k\).
Assume that \(p' \in p G_{k+1}\), and so there exists \(g\in G_{k+1}\) for which \(p' = pg\). Let \(p_{i,j}\) be the \((i, j)^{th}\) entry of p and let \(\lambda _r := g_{r,r}\). Then the entries of the \(r^{th}\) column of \(p'\) are:
and hence the \(r^{th}\) columns of p and \(p'\) are multiples of each other.
Conversely, let \(c_r\) be the \(r^{th}\) column of p and \(c'_r\) be the \(r^{th}\) column of \(p'\), and assume \(c'_r = \lambda \cdot c_r\) for some \(\lambda \in \mathbb {F}_q^{\times }\). Let \(\pi = p^{-1}\cdot p'\). Then the entries of the \(r^{th}\) column of \(\pi \) are
where \(\delta _{ir}\) is the Kronecker delta. This implies that the \(r^{th}\) column of \(\pi \) is zero everywhere except at the \((r, r)^{th}\) entry. Since \(\pi \in G_k\), this implies \(\pi \in G_{k+1}\) and hence \(p' \in pG_{k+1}\).
The case for even k is similar. \(\square \)
Using the above lemma, we are able to construct an improved version of Algorithm 2:

4.4 Complexity Analysis and Experiments
Time Complexity. We observe that the complexity of the algorithm is dominated by the complexity of finding each \(\mathrm {\Gamma }_{k+1}\): the last step involves solving a discrete logarithm problem over a small field and a small linear system modulo \(q-1\). Moreover, the cost of finding an element \(h_{k+1}\) is essentially the same as the cost of finding one element of \(\mathrm {\Gamma }_{k+1}\).
Lemma 7
The size of \(G_k\) is as follows:
-
For k even, \(|G_k| = (q-1)^{(\frac{k}{2} - 1)} \cdot |\mathrm{GL}\,_{N-\frac{k}{2}}(\mathbb F_q)|.\)
-
For k odd, \(|G_k| = (q-1)^{\left\lfloor \frac{k}{2} \right\rfloor } \cdot q^{N - \left\lfloor \frac{k}{2} \right\rfloor - 1} \cdot |\mathrm{GL}\,_{N-\lfloor \frac{k}{2} \rfloor -1}(\mathbb F_q)|.\)
Proof
For k even, the block diagonal structure of \(G_k\) consists of an invertible matrix of size \(N-\frac{k}{2}\) and \(\frac{k}{2}\) entries on the diagonal. The bottommost such entry is 1, and the other diagonal entries can be any of the nonzero elements in \(\mathbb F_q\), and so we obtain the formula above. For k odd, the block diagonal structure of \(G_k\) consists of an invertible matrix of size \(N-\left\lfloor \frac{k}{2} \right\rfloor \) with a zero bottom row except for the last entry, and \(\left\lfloor \frac{k}{2} \right\rfloor \) other entries on the diagonal. Note that \(\left\lfloor \frac{k}{2} \right\rfloor - 1\) of the diagonal entries can be any nonzero element in \(\mathbb F_q\) while the bottommost entry is 1. The invertible matrix of size \(N-\left\lfloor \frac{k}{2} \right\rfloor \) consists of any element in \(\mathrm{GL}\,_{N-\lfloor \frac{k}{2} \rfloor -1}(\mathbb F_q)\) on the upper diagonal, any nonzero entry from \(\mathbb F_q\) for the bottom right entry, and a value in \(\mathbb F_q\) for the rest of the entries in the last column. From this we obtain the formula above. \(\square \)
Lemma 8
\(\frac{|G_k|}{|G_{k+1}|} \approx q^{N-1-\left\lfloor \frac{k}{2} \right\rfloor }\)
Proof
This follows immediately from the previous lemma. \(\square \)
If we pick a random element of \(G_k\), the probability that it will also be in \(G_{k+1}\) is therefore approximately \(1/q^{N-1-\left\lfloor \frac{k}{2} \right\rfloor }\). In our algorithm, we make the assumption that random products of elements in \(\mathrm {\Gamma }_k\) produces random elements in \(G_{k+1}\), and so we expect that we will be able to obtain one element of \(\mathrm {\Gamma }_{k+1}\) after considering \(q^{N-1-\left\lfloor \frac{k}{2} \right\rfloor }\) random products. By using the meet-in-the-middle approach described earlier, we reduce the expected number of products we need to consider by \(q^{(N-1-\left\lfloor \frac{k}{2} \right\rfloor )/2}\). Since we need to generate \(|\mathrm {\Gamma }_{k+1} \cup \{h_{k+1}\}| = \gamma _{k+1}\) new elements, the expected number of products we need to consider is bounded by \(\gamma _{k+1} \cdot q^{(N-1-\left\lfloor \frac{k}{2} \right\rfloor )/2}.\) The total number of products our algorithm needs to consider is therefore
If we further assume that \(\gamma _k = \gamma \) is constant, the above simplifies to
Thus, the complexity of the attack is exponential in N and \(\log {q}\).
Memory Complexity. The final stage of the algorithm requires a negligible amount of memory. For the inductive stages, in stage k of the algorithm, we need to store up to \(q^{\frac{1}{2}\left( N-1-\left\lfloor \frac{k}{2} \right\rfloor \right) }\) square matrices of size \(N \times N\), each entry being in \(\mathbb {F}_q\), so we will need \(\log _2 (q) \cdot N^2 q^{\frac{1}{2}\left( N-1-\left\lfloor \frac{k}{2} \right\rfloor \right) }\) bits of memory for each stage. However, we do not need to keep the matrices from stage k when proceeding to stage \(k+1\) (except to store the relatively small number of matrices of \(\mathrm {\Gamma }_{k+1}\) and \(h_{k+1}\)), and so the total amount of memory required for the entire algorithm is the maximum amount of memory required by each stage, which is \(\log _2 (q) \cdot N^2 q^{\frac{N-1}{2}}\). Memory costs can be removed entirely using standard cycle-finding and distinguished point techniques [44, 45].
Length Complexity. We now analyze the length of the forged signature that we obtain.
Note that the length of any element in \(\mathrm {\Gamma }_{k+1}\), as a word over elements of \(\mathrm {\Gamma }_{k}\), is given by \(L_k\). Also, our algorithm expresses \(h_{k+1}\) as the product of \(h_k\) with \(L_K\) elements of \(\mathrm {\Gamma }_{k}\). Unfolding this recurrence, we see that \(h_{2_N-2}\) is the product of h with \(\alpha \) elements of \(\mathrm {\Gamma }\), where
since the last summand dominates the sum. Similarly, we see that each \(g_i^{(2N-2)}\) is a product of \(\approx \alpha \) elements of \(\mathrm {\Gamma }\).
If we further assume that \(\gamma _{k} = \gamma \) is constant, the above formula simplifies to
In the final step of the algorithm, we find a relation (6)
Since the \(v_i\) come from the solution to a system of linear equations over \(\mathbb {Z}_{q-1}\), we know that \(v_i < q - 1\). Also, since the space we are working over in our system of linear Eq. 7 has dimension \(N-1\), it follows that we need at most \(N-1\) terms in the product above. Putting this all together, we see that h is then the product of \(\big (1 + (N-1)(q-1)\big ) \alpha \approx Nq\alpha \) elements of \(\mathrm {\Gamma }\), and so our forged signature is of length \(\approx lNq\alpha \), where l is the length of the WalnutDSA signatures in \(\mathcal {M}\).
Experimental Results. We have implemented our factorization algorithm in Magma [46] and tested it experimentally (the code is available from Christophe Petit’s webpage). The only parameters of our algorithm are the values of \(L_k\), which we can control via \(\gamma _k\). Note that increasing \(\gamma _k\) decreases the length of our forged signature but increases the running time of our algorithm. In our experiments, we first assumed that we are able to obtain ten legitimate message-signature pairs. We then chose \(\gamma _k\) such that \(L_k\) is large enough for us to find the relations for all \(h_k\). This allowed us to obtain a signature of length \(2^{35}\) times the length of a legitimate signature in approximately two minutes. To reduce the length of the forged signature, we increased \(\gamma _k\) such that \(\gamma _k \approx 200000\) for \(k > 3\). This allowed us to obtain signatures of length \(2^{25}\) times the length of a legitimate signature in five minutes.
4.5 Practical Improvements
In this section we present two improvements on our attack.
Shorter Subgroup Chain. The subgroup chain we used above was chosen to have small subgroup indices \([G_k : G_{k+1}]\) in order to minimize computation time at each step. However, the first few stages of the algorithm contribute to the majority of the running time, whereas all stages contribute significantly to the total length of the signatures we produce.
To reduce signature lengths without affecting the computation time significantly, one can replace the above subgroup chain by another chain. An example of such a chain could have the same first five subgroups (at a cost of roughly \(q^{3.5}\), \(q^3\), \(q^3\), \(q^{2.5}\) and \(q^{2.5}\) respectively), but then instead of considering a subgroup where the lower diagonal entries in the last four rows are zeroes (at a cost \(q^2\)), consider a subgroup where the lower diagonal entries in the last five rows are zeroes (at a cost of \(q^{3.5}\)), then a subgroup where the upper diagonal entries in the last five rows are also zeroes (at a cost of \(q^{3.5}\)), and finally considering the diagonal subgroup (at a cost of \(q^3\)). In that case, the factorization length can be approximated by
where \((c_1,c_2,\ldots ,c_8)=(7,6,6,5,5,7,7,6)\), which for \(\gamma _k=256\) gives a signature size approximately \(2^{11}\) times that of a normal signature size, while retaining the time complexity of roughly \(q^{3.5}\).
Dealing with Non-Generating Sets. We have not been able to prove that the elements we construct in our recursive step are indeed generators for the next subgroup. We expect that this is the case with a high probability on the initial matrix choices when choosing product lengths as above, and this was verified for all recursive steps in our experimental tests.
The diagonal matrices generated for the last stage, however, may not generate the whole diagonal group when the number of generators constructed at each step is very small. We observed this experimentally when using \(\gamma _k=2\) in all but the last inductive stage, and can explain it intuitively as follows. Let . At each stage, the diagonal entries in the diagonal part (in block diagonal form) of \(A^{(k)}\) and \(B^{(k)}\) can be approximated as random elements in \(\mathbb {F}_q^\times \). Consider any pair of indices \(\big ((i_1, i_1), (i_2, i_2)\big )\) in the diagonal part of the matrix, and consider the 2-dimensional vectors \(\big (A_{i_1, i_1}^{(k)}, A_{i_2, i_2}^{(k)}\big )\) and \(\big (B_{i_1, i_1}^{(k)}, B_{i_2, i_2}^{(k)}\big )\). It is a necessary condition for these two matrices to generate the whole subgroup, that there is no linear dependence between the two vectors obtained by taking entrywise logarithms of the above vectors. For a fixed pair of indices \((i_1,i_1)\) and \((i_2, i_2)\), this happens with probability \(\frac{q-2}{q-1}\). In the later inductive stages, the diagonal part of the matrices are larger, and hence the probability that all pairs of the logarithm vectors are linearly independent decreases. Moreover, any linear dependence occurring in one stage will be preserved in subsequent stages. It is therefore intuitively plausible that \(\mathrm {\Gamma }_{2N-2}\) may not generate \(G_{2N-2}\) when \(\gamma _k\) is very small. We leave a more complete analysis of this to further work.
In our experiments, it was easy to choose \(\gamma _k\) large enough such that all stages would produce a sufficient number of generators for the following subgroup, including that of diagonal subgroup \(G_{2N-2}\). We note also that in the event that \(\mathrm {\Gamma }_{2N-2}\) does not generate \(G_{2N-2}\), one can simply set \(h_1 = \mathrm {Id}_n\) and relaunch the whole factorization algorithm: this will produce a new set of diagonal matrices \(\mathrm {\Gamma }'_{2N-2}\) that, together with \(\mathrm {\Gamma }_{2N-2}\), is likely to generate the \(G_{2N-2}\). This therefore allows our attack to succeed with high probability even when we only have access to two WalnutDSA message-signature pairs.
5 Discussion and Further Work
Due to its algebraic structure, WalnutDSA is inherently vulnerable to malleability attacks. The use of a cryptographic hash function in the message encoding process is intended to remove this inherent malleability, in the same way as Full Domain Hash removes the inherent malleability in the RSA signature algorithm. Our attack, however, goes around this protection mechanism by reducing the cryptanalysis of WalnutDSA to an instance of a factorization problem in the group \(\mathrm{GL}\,_N(\mathbb {F}_q)\).
We briefly discuss two countermeasures against this attack, namely increasing the parameter sizes and checking the signature lengths.
5.1 Increasing the Parameters
In order to defeat our attack, one can choose to increase the parameters of WalnutDSA such that the complexity of our attack is increased to \(\sim 2^{100}\). As shown in Sect. 4.4, the complexity of our attack can be estimated by \(\gamma \cdot q^{\frac{N-1}{2}}\). One can therefore choose to increase the value of q and N such that \(q^{\frac{N-1}{2}} \approx 2^{100}\), by choosing \(q = 2^{16}\) and \(N = 14\) for example.
5.2 Checking Signature Length
Recall that our forged signature s is obtained from concatenating existing signatures. The length of s depends primarily on the length of the products \(L_k\) considered in Algorithm 3. As discussed in Sects. 4.4 and 4.5, larger values for \(\gamma _k = |\mathrm {\Gamma }_{k}|\) and a different choice of subgroup chain can achieve shorter forged signature lengths at the cost of higher time and memory complexity. Our best attempt produced a forged signature \(2^{25}\) times larger than the original WalnutDSA signatures.
Observe that the length of a legitimate signature (one produced according to WalnutDSA) depends on the length of \(\textsc {sk}\), \(\mathcal {E}(m),\) and the cloaking elements. Even though these lengths are not fixed, we expect them to be within certain bounds, which will depend on the implementation of the protocol. However, in principle, the length of s should greatly exceed these bounds. Therefore, we suggest that the length of both cloaking elements and private keys be bounded above, so that the length of a WalnutDSA signature is always less than some constant \(\mathcal {L}\). Any signature of length greater than \(\mathcal {L}\) should then be rejected.
5.3 Limitations of the Countermeasures
We do not know, however, whether s could be shortened to fit the new imposed bounds. Methods such as Dehornoy’s handle reduction [14] could potentially reduce the length of our forged signatures sufficiently in a non-negligible fraction of instances.
We stress that more efficient algorithms for solving the factorization problem in \(\mathrm{GL}\,_N(\mathbb {F}_q)\) may also exist. One may expect factorizations as small as \(\log _{|M|}|\mathrm{GL}\,_N(\mathbb {F}_q)| = \log _{|M|}q^{N^2-N-1}\) to exist, where M is the set of WalnutDSA message-signature pairs one has access to. If an efficient algorithm to compute short factorizations exists, the increase in parameters q and N needed to achieve a sufficient level of security would then make WalnutDSA unsuitable for embedded devices. Moreover, with \(|\mathcal {M}|\) large enough, the forged signatures will only be a small constant factor larger than legitimate signatures, and hence determining a suitable bound \(\mathcal {L}\) to apply our second countermeasure may be challenging.
Finally, we observe that our work has not considered the hard problems underlying the WalnutDSA protocol, that of reversing E-Multiplication and the cloaked conjugacy search problem. The study of these problems, along with the effectiveness of the above countermeasures, will be of interest for further work.
6 Conclusion
In this paper we provided a practical cryptanalysis of WalnutDSA. Given a couple of random valid message-signature pairs, our attack is able to produce new signatures on arbitrary messages in approximately two minutes. We also discuss countermeasures to our attack, including a simple modification of the verification algorithm.
References
Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 1994 Proceedings of 35th Annual Symposium on Foundations of Computer Science, pp. 124–134. IEEE (1994)
McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Deep Space Netw. Prog. Rep. 44, 114–116 (1978)
Micciancio, D., Regev, O.: Lattice-based cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 147–191. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-540-88702-7_5
Ding, J., Yang, B.Y.: Multivariate public key cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 193–241. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-540-88702-7_6
Garber, D.: Braid Group Cryptography. CoRR abs/0711.3941 (2007). http://arxiv.org/abs/0711.3941
SecureRF. https://www.securerf.com/
Anshel, I., Atkins, D., Goldfeld, D., Gunnells, P.E.: WalnutDSA\(^{\rm TM}\): a quantum-resistant digital signature algorithm. Cryptology ePrint Archive, Report 2017/058 (2017). http://eprint.iacr.org/2017/058
SecureRF and Intel collaboration delivers future-proof FPGA security solutions. https://www.iot-now.com/2017/09/28/67603-securerf-intel-collaboration-delivers-future-proof-fpga-security-solutions/
Ben-Zvi, A., Blackburn, S.R., Tsaban, B.: A practical cryptanalysis of the algebraic eraser. Cryptology ePrint Archive, Report 2015/1102 (2015). http://eprint.iacr.org/2015/1102
Myasnikov, A.D., Ushakov, A.: Cryptanalysis of Anshel-Anshel-Goldfeld-Lemieux key agreement protocol. Groups Complex. Cryptol. 1(1), 63–75 (2009)
Kalka, A., Teicher, M., Tsaban, B.: Short expressions of permutations as products and cryptanalysis of the algebraic eraser. Adv. Appl. Math. 49(1), 57–76 (2012)
Garside, F.A.: The braid group and other groups. Q. J. Math. 20(1), 235–254 (1969)
Birman, J., Gebhardt, V., Gonzáilez-Meneses, J.: Conjugacy in Garside groups I: cyclings, powers and rigidity. Groups. Geom. Dyn. 1, 221–279 (2007)
Dehornoy, P.: A fast method for comparing braids. Adv. Math. 125(2), 200–235 (1997)
Tillich, J.P., Zémor, G.: Hashing with \(SL_2\). In: CRYPTO, pp. 40–49 (1994)
Petit, C., Lauter, K., Quisquater, J.-J.: Full cryptanalysis of LPS and morgenstern hash functions. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 263–277. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85855-3_18
Petit, C., Quisquater, J.-J.: Preimages for the Tillich-Zémor hash function. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 282–301. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19574-7_20
Babai, L., Hayes, T.: Near-independence of permutations and an almost sure polynomial bound on the diameter of the symmetric group. In: SODA, pp. 1057–1066 (2005)
Petit, C., Quisquater, J.J.: Rubik’s for cryptographers. Not. Am. Math. Soc. 60, 733–739 (2013)
Katz, J., Lindell, Y.: Introduction to Modern Cryptography. 2nd edn. Chapman & Hall/CRC Cryptography and Network Security Series. CRC Press/Taylor & Francis Group, Boca Raton (2014)
Epstein, D.B.A., Paterson, M.S., Cannon, J.W., Holt, D.F., Levy, S.V., Thurston, W.P.: Word Processing in Groups. A. K. Peters Ltd., Natick (1992)
Elrifai, E.A., Morton, H.: Algorithms for positive braids. Q. J. Math. 45(4), 479–497 (1994)
Gebhardt, V.: A new approach to the conjugacy problem in Garside groups. J. Algebra 292(1), 282–302 (2005). Computational Algebra
Hughes, J., Tannenbaum, A.: Length-Based Attacks for Certain Group Based Encryption Rewriting Systems. CoRR cs.CR/0306032 (2003)
Garber, D., Kaplan, S., Teicher, M., Tsaban, B., Vishne, U.: Probabilistic solutions of equations in the braid group. Adv. Appl. Math. 35(3), 323–334 (2005)
Myasnikov, A.D., Ushakov, A.: Length based attack and braid groups: cryptanalysis of Anshel-Anshel-Goldfeld key exchange protocol. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 76–88. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-71677-8_6
Hughes, J.: A linear algebraic attack on the AAFG1 braid group cryptosystem. In: Batten, L., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 176–189. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45450-0_15
Lee, S.J., Lee, E.: Potential weaknesses of the commutator key agreement protocol based on braid groups. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 14–28. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-46035-7_2
Cheon, J.H., Jun, B.: A polynomial time algorithm for the braid Diffie-Hellman conjugacy problem. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 212–225. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45146-4_13
Babai, L., Seress, Á.: On the diameter of permutation groups. Eur. J. Comb. 13(4), 231–243 (1992)
Helfgott, H.A.: Growth and generation in \(SL_2(Z/pZ)\). Ann. Math. 167(2), 601–623 (2008)
Pyber, L., Szabó, E.: Growth in finite simple groups of Lie type. J. Am. Math. Soc. 29(1), 95–146 (2016)
Petit, C., Quisquater, J.: Cayley hash functions. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, vol. 2, pp. 183–184. Springer, Heidelberg (2011). https://doi.org/10.1007/978-1-4419-5906-5_126
Zémor, G.: Hash functions and Cayley graphs. Des. Codes Crypt. 4(4), 381–394 (1994)
Tillich, J.-P., Zémor, G.: Group-theoretic hash functions. In: Cohen, G., Litsyn, S., Lobstein, A., Zémor, G. (eds.) Algebraic Coding 1993. LNCS, vol. 781, pp. 90–110. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-57843-9_12
Grassl, M., Ilic, I., Magliveras, S.S., Steinwandt, R.: Cryptanalysis of the Tillich-Zémor hash function. J. Cryptol. 24(1), 148–156 (2011)
Charles, D.X., Lauter, K.E., Goren, E.Z.: Cryptographic hash functions from expander graphs. J. Cryptol. 22(1), 93–113 (2009)
Tillich, J.-P., Zémor, G.: Collisions for the LPS expander graph hash function. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 254–269. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78967-3_15
Bellare, M., Micciancio, D.: A new paradigm for collision-free hashing: incrementality at reduced cost. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 163–192. Springer, Heidelberg (1997). https://doi.org/10.1007/3-540-69053-0_13
Anshel, I., Anshel, M., Goldfeld, D., Lemieux, S.: Key agreement, the algebraic eraser\(^{\rm TM}\), and lightweight cryptography. In: Algebraic Methods in Cryptography. Contemporary Mathematics, vol. 418, pp. 1–34. American Mathematical Society, Providence (2006)
Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols, pp. 62–73. ACM Press (1993)
Birman, J.S.: Braids, Links, and Mapping Class Groups: Annals of Mathematics Studies, vol. 82. Princeton University Press, Princeton (1975)
Waterhouse, W.C.: Two generators for the general linear groups over finite fields. Linear Multilinear Algebra 24(4), 227–230 (1989)
van Oorschot, P.C., Wiener, M.J.: Parallel collision search with cryptanalytic applications. J. Cryptol. 12, 1–28 (1999)
Quisquater, J.-J., Delescaille, J.-P.: How easy is collision search? Application to DES. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 429–434. Springer, Heidelberg (1990). https://doi.org/10.1007/3-540-46885-4_43
Bosma, W., Cannon, J., Playoust, C.: The Magma algebra system. I. The user language. J. Symb. Comput. 24(3–4), 235–265 (1997). Computational algebra and number theory (London, 1993)
Acknowledgements
Giacomo Micheli was supported by the Swiss National Science Foundation grant number 171248. Daniel Hart and Guillermo Pascual Perez were both kindly supported by EPSRC Vacation Bursaries.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
A The Garside Normal Form
A The Garside Normal Form
We follow the presentation in [5]. Define a positive braid, which is an element of \(B_N\) that can be written as a product of positive powers of the generators. Let \(B_N^+\) denote the set of positive braids. One example of a positive braid is the fundamental braid \(\mathrm {\Delta }_N \in B_N\):
Geometrically, \(\mathrm {\Delta }_N\) is the braid in which any two strands cross positively exactly once.
We now define a partial order on \(B_N\): for \(A,B \in B_N,\) write \(A \preceq B\) if there exists \(C \in B_N^+\) such that \(B = AC.\) With this definition, we say that \(P \in B_N\) is a permutation braid if \(\varepsilon \preceq P \preceq \mathrm {\Delta }_N,\) where \(\varepsilon \) is the empty braid. Geometrically, a permutation braid is a braid in which any two strands cross positively at most once.
Let P be a permutation braid. Then the starting set of P is
and the finishing set of P is
Furthermore, if A is any positive braid, its left-weighted decomposition into permutation braids is
where \(S(P_{i+1}) \subset F(P_i)\) for any i.
Rights and permissions
Copyright information
© 2018 International Association for Cryptologic Research
About this paper
Cite this paper
Hart, D., Kim, D., Micheli, G., Pascual-Perez, G., Petit, C., Quek, Y. (2018). A Practical Cryptanalysis of WalnutDSA\(^{\text {TM}}\) . In: Abdalla, M., Dahab, R. (eds) Public-Key Cryptography – PKC 2018. PKC 2018. Lecture Notes in Computer Science(), vol 10769. Springer, Cham. https://doi.org/10.1007/978-3-319-76578-5_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-76578-5_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-76577-8
Online ISBN: 978-3-319-76578-5
eBook Packages: Computer ScienceComputer Science (R0)