@inproceedings{de970d83cd724d1f8e55f25256643dd7,
title = "A Practical Cryptanalysis of the Algebraic Eraser",
abstract = "We present a novel cryptanalysis of the Algebraic Eraser primitive. This key agreement scheme, based on techniques from permutation groups, matrix groups and braid groups, is proposed as an underlying technology for ISO/IEC 29167-20, which is intended for authentication of RFID tags. SecureRF, the company owning the trademark Algebraic Eraser, markets it as suitable in general for lightweight environments such as RFID tags and other IoT applications. Our attack is practical on standard hardware: for parameter sizes corresponding to claimed 128-bit security, our implementation recovers the shared key using less than 8 CPU hours, and less than 64MB of memory.",
author = "Adi Ben-Zvi and Simon Blackburn and Boaz Tsaban",
year = "2016",
month = jul,
day = "21",
doi = "10.1007/978-3-662-53018-4_7",
language = "English",
isbn = "978-3-662-53017-7",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "179--189",
editor = "Matthew Robshaw and Jonathan Katz",
booktitle = "Advances in Cryptology - CRYPTO 2016",
}