2014
DOI: 10.1515/jmc-2012-0033
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of matrix conjugation schemes

Abstract: Abstract. In this paper we cryptanalyze two protocols: GrigorievShpilrain authentication protocol and Wang et al. public key encryption protocols that use computational hardness of some variations of the conjugacy search problem in noncommutative monoids. We devise a practical heuristic algorithm solving those problems. As a conclusion we claim that these protocols are insecure for the proposed parameter values.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 11 publications
(23 reference statements)
0
2
0
Order By: Relevance
“…A second way to attack the present protocol would be to find a polynomial time algorithm to solve the algebraic generalized symmetric decomposition. As some simpler OWTF based on algebraic conjugation were successfully cryptanalyzed [38,39], it was mandatory to find very hard functions. We presented earlier (see Definition (5)) a stronger version, the blind general symmetric decomposition problem (BGSDP).…”
Section: Protocol Securitymentioning
confidence: 99%
“…A second way to attack the present protocol would be to find a polynomial time algorithm to solve the algebraic generalized symmetric decomposition. As some simpler OWTF based on algebraic conjugation were successfully cryptanalyzed [38,39], it was mandatory to find very hard functions. We presented earlier (see Definition (5)) a stronger version, the blind general symmetric decomposition problem (BGSDP).…”
Section: Protocol Securitymentioning
confidence: 99%
“…(xiv) In 2014, Myasnikov and Ushakov [36] cryptanalyzed the authentication scheme proposed by Shpilrain and public key encryption to use the hardness of the Conjugacy Search Problem in noncommutative monoids. A heuristic algorithm, was devised by those to solve these problems and declared that these protocols are anxious.…”
Section: Introductionmentioning
confidence: 99%