|
This article is cited in 5 scientific papers (total in 5 papers)
Mathematical Methods of Cryptography
Cryptanalysis of Ushakov–Shpilrain's authentication protocol based on the twisted conjugacy problem
M. N. Gornova, E. G. Kukina, V. A. Romankov Omsk State University, Omsk, Russia
Abstract:
We give a cryptanalysis of Ushakov–Shpilrain's authentication protocol based on the twisted conjugacy problem for a pair of endomorphisms on the semigroup of all $2\times2$ matrices over the ring of truncated one-variable polynomials over the field $\mathbb F_2$. It is shown that the private key of the protocol can be computed by solving the system of linear equations over $\mathbb F_2$. We present a theoretical estimation for the complexity of this cryptanalysis and describe practical results obtained in a computer experiment. It is shown that the protocol is theoretically and practically vulnerable.
Keywords:
cryptography, authentication, endomorphism, twisted conjugacy, truncated polynomials.
Citation:
M. N. Gornova, E. G. Kukina, V. A. Romankov, “Cryptanalysis of Ushakov–Shpilrain's authentication protocol based on the twisted conjugacy problem”, Prikl. Diskr. Mat., 2015, no. 2(28), 46–53
Linking options:
https://www.mathnet.ru/eng/pdm505 https://www.mathnet.ru/eng/pdm/y2015/i2/p46
|
Statistics & downloads: |
Abstract page: | 392 | Full-text PDF : | 141 | References: | 69 |
|