2015
DOI: 10.1515/gcc-2015-0007
|View full text |Cite
|
Sign up to set email alerts
|

A linear decomposition attack

Abstract: Abstract. We discuss a new attack, termed a dimension or linear decomposition attack, on several known group-based cryptosystems. This attack gives a polynomial time deterministic algorithm that recovers the secret shared key from the public data in all the schemes under consideration. Furthermore, we show that in this case, contrary to the common opinion, the typical computational security assumptions are not very relevant to the security of the schemes, i.e., one can break the schemes without solving the alg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
29
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(30 citation statements)
references
References 45 publications
0
29
0
Order By: Relevance
“…As we have already pointed out, if a (semi)group G is non-commutative and has non-central invertible elements, then it always has a non-identical inner automorphism, i.e., conjugation by an element g ∈ G such that g −1 hg = h for at least some h ∈ G. Now let G be the semigroup of 3 × 3 matrices over the group ring Z 7 [A 5 ], where A 5 is the alternating group on 5 elements. Here we use an extension of the semigroup G by an inner automorphism ϕ H , which is conjugation by a matrix As we have mentioned in the Introduction, the protocol in this section was attacked in [9] and [14] by a "linear algebra attack". This was possible partly because of the special "compact" form of the above security assumptions, and partly because the dimension of a linear representation of the platform semigroup happens to be small enough in this case for a linear algebra attack to be computationally feasible.…”
Section: Matrices Over Group Rings and Extensions By Inner Automorphismsmentioning
confidence: 99%
See 1 more Smart Citation
“…As we have already pointed out, if a (semi)group G is non-commutative and has non-central invertible elements, then it always has a non-identical inner automorphism, i.e., conjugation by an element g ∈ G such that g −1 hg = h for at least some h ∈ G. Now let G be the semigroup of 3 × 3 matrices over the group ring Z 7 [A 5 ], where A 5 is the alternating group on 5 elements. Here we use an extension of the semigroup G by an inner automorphism ϕ H , which is conjugation by a matrix As we have mentioned in the Introduction, the protocol in this section was attacked in [9] and [14] by a "linear algebra attack". This was possible partly because of the special "compact" form of the above security assumptions, and partly because the dimension of a linear representation of the platform semigroup happens to be small enough in this case for a linear algebra attack to be computationally feasible.…”
Section: Matrices Over Group Rings and Extensions By Inner Automorphismsmentioning
confidence: 99%
“…We therefore offer here another platform group that we believe should make the protocol invulnerable to the attacks of [3], [9], [14]. The group is a free nilpotent p-group, for a sufficiently large prime p. We give a formal definition of this group in Section 8; here we just say that this is a finite group all of whose elements have order dividing p n for some fixed n ≥ 1.…”
Section: Introductionmentioning
confidence: 99%
“…In [22], the author introduced the method of linear decomposition applicable in algebraic cryptanalysis. In [19] this method was further developed by the author and Myasnikov. See also [21], [25] and [24].…”
Section: Introductionmentioning
confidence: 99%
“…Such a protocol developed in a spirit of Noncommutative Cryptography (NC), see [17]- [24]). It is very important that Non-Commutative cryptography is well supported by new modern achievements in Cryptanalysis (see [40] - [48]).…”
Section: Introductionmentioning
confidence: 99%