IACR News item: 02 December 2025
Koki Jimbo
We study several asymmetric structured key agreement schemes based on
noncommutative matrix operations, including the recent proposal of Lizama as well as the strongly asymmetric algorithms SAA-3 and SAA-5 of Accardi
et al.\ We place them in a common algebraic framework for
public key agreement and identify simple structural conditions under which an
eavesdropper can reconstruct an effective key-derivation map and reduce key
recovery to solving linear systems over finite fields. We then show that the
three matrix-based schemes mentioned above all instantiate our algebraic framework and can therefore be broken in polynomial time from public
information alone. In particular, their security reduce to the hardness of
linear-algebraic problems and does not exceed that of the underlying discrete
logarithm problem. Our results demonstrate that the weakness of these schemes
is structural rather than parametric, and that minor algebraic modifications are insufficient to repair them.
Additional news items may be found on the IACR news page.