Abstract:Abstract. For a finite group G to be used in the MOR public key cryptosystem, it is necessary that the discrete logarithm problem(DLP) over the inner automorphism group Inn(G) of G must be computationally hard to solve. In this paper, under the assumption that the special conjugacy problem of G is easy, we show that the complexity of the MOR system over G is about log |G| times larger than that of DLP over G in a generic sense. We also introduce a group-theoretic method, called the group extension, to analyze … Show more
“…Since the black box group algorithms work in any group, they will work in the automorphism group too, see [9,Theorem 1]. We have no way to prevent that.…”
Section: Security Of the Proposed Mor Cryptosystemmentioning
ABSTRACT. This is a study of the MOR cryptosystem using the special linear group over finite fields. The automorphism group of the special linear group is analyzed for this purpose. At our current state of knowledge, I show that this MOR cryptosystem has better security than the ElGamal cryptosystem over finite fields.
“…Since the black box group algorithms work in any group, they will work in the automorphism group too, see [9,Theorem 1]. We have no way to prevent that.…”
Section: Security Of the Proposed Mor Cryptosystemmentioning
ABSTRACT. This is a study of the MOR cryptosystem using the special linear group over finite fields. The automorphism group of the special linear group is analyzed for this purpose. At our current state of knowledge, I show that this MOR cryptosystem has better security than the ElGamal cryptosystem over finite fields.
“…In this section we describe the MOR cryptosystem [1,6] as automorphisms of a finite group G, however it can be generalized to other finitely generated algebraic structures easily. A description and a critical analysis of the MOR cryptosystem is in [3] and the references there.…”
This paper studies the MOR cryptosystem, using the automorphism group of the extra-special p-group of exponent p, for an odd prime p. Similar results can be obtained for extra-special p-groups of exponent p 2 and for the even prime.
“…In [4] the authors developed a central commutator attack ; they showed that inner automorphisms are not well suited for MOR cryptosystem; especially when the group is nilpotent.…”
Section: A Proposed Automorphism For the Mor Cryptosystemmentioning
confidence: 99%
“…The MOR cryptosystem has attracted a lot of attention and some well written papers [4,11,14]. In this article we propose a new group and a subgroup of the group of automorphisms for the MOR cryptosystem.…”
In this paper we study the MOR cryptosystem. We use the group of unitriangular matrices over a finite field as the non-abelian group in the MOR cryptosystem. We show that a cryptosystem similar to the El-Gamal cryptosystem over finite fields can be built using the proposed groups and a set of automorphisms of these groups. We also show that the security of this proposed MOR cryptosystem is equivalent to the El-Gamal cryptosystem over finite fields.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.