Cryptanalysis of matrix conjugation schemes

In this paper we cryptanalyze two protocols: the Grigoriev–Shpilrain authentication protocol and a public key cryptosystem due to Wang, Wang, Cao, Okamoto and Shao. Both of these protocols use the computational hardness of some variations of the conjugacy search problem in a class of noncommutative...

Full description

Bibliographic Details
Main Authors: Myasnikov Alex D., Ushakov Alexander
Format: Article
Language:English
Published: De Gruyter 2014-06-01
Series:Journal of Mathematical Cryptology
Subjects:
Online Access:https://doi.org/10.1515/jmc-2012-0033
_version_ 1798040034801090560
author Myasnikov Alex D.
Ushakov Alexander
author_facet Myasnikov Alex D.
Ushakov Alexander
author_sort Myasnikov Alex D.
collection DOAJ
description In this paper we cryptanalyze two protocols: the Grigoriev–Shpilrain authentication protocol and a public key cryptosystem due to Wang, Wang, Cao, Okamoto and Shao. Both of these protocols use the computational hardness of some variations of the conjugacy search problem in a class of noncommutative monoids. We devise a practical heuristic algorithm solving those problems. As a conclusion we claim that these protocols are insecure for the proposed parameter values.
first_indexed 2024-04-11T22:01:56Z
format Article
id doaj.art-13c6d23ec4ea4d12bd6ca09e8f61a2ab
institution Directory Open Access Journal
issn 1862-2976
1862-2984
language English
last_indexed 2024-04-11T22:01:56Z
publishDate 2014-06-01
publisher De Gruyter
record_format Article
series Journal of Mathematical Cryptology
spelling doaj.art-13c6d23ec4ea4d12bd6ca09e8f61a2ab2022-12-22T04:00:54ZengDe GruyterJournal of Mathematical Cryptology1862-29761862-29842014-06-01829511410.1515/jmc-2012-0033Cryptanalysis of matrix conjugation schemesMyasnikov Alex D.0Ushakov Alexander1Department of Mathematics, Stevens Institute of Technology, Hoboken, NJ 07030, USADepartment of Mathematics, Stevens Institute of Technology, Hoboken, NJ 07030, USAIn this paper we cryptanalyze two protocols: the Grigoriev–Shpilrain authentication protocol and a public key cryptosystem due to Wang, Wang, Cao, Okamoto and Shao. Both of these protocols use the computational hardness of some variations of the conjugacy search problem in a class of noncommutative monoids. We devise a practical heuristic algorithm solving those problems. As a conclusion we claim that these protocols are insecure for the proposed parameter values.https://doi.org/10.1515/jmc-2012-0033group-based cryptographyconjugacy search problemmatrix monoidstruncated polynomials94a6068w30
spellingShingle Myasnikov Alex D.
Ushakov Alexander
Cryptanalysis of matrix conjugation schemes
Journal of Mathematical Cryptology
group-based cryptography
conjugacy search problem
matrix monoids
truncated polynomials
94a60
68w30
title Cryptanalysis of matrix conjugation schemes
title_full Cryptanalysis of matrix conjugation schemes
title_fullStr Cryptanalysis of matrix conjugation schemes
title_full_unstemmed Cryptanalysis of matrix conjugation schemes
title_short Cryptanalysis of matrix conjugation schemes
title_sort cryptanalysis of matrix conjugation schemes
topic group-based cryptography
conjugacy search problem
matrix monoids
truncated polynomials
94a60
68w30
url https://doi.org/10.1515/jmc-2012-0033
work_keys_str_mv AT myasnikovalexd cryptanalysisofmatrixconjugationschemes
AT ushakovalexander cryptanalysisofmatrixconjugationschemes