Pitfalls in public key cryptosystems based on free partially commutative monoids and groups (Q2371104): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(5 intermediate revisions by 4 users not shown)
Property / author
 
Property / author: María Isabel González Vasco / rank
Normal rank
 
Property / author
 
Property / author: María Isabel González Vasco / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.aml.2005.11.014 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2000695857 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Progress in Cryptology - INDOCRYPT 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Clouds over a public key cryptosystem based on Lyndon words / rank
 
Normal rank
Property / cites work
 
Property / cites work: A reaction attack on a public key cryptosystem based on the word problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Progress in Cryptology - INDOCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3997944 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 10:00, 26 June 2024

scientific article
Language Label Description Also known as
English
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups
scientific article

    Statements

    Pitfalls in public key cryptosystems based on free partially commutative monoids and groups (English)
    0 references
    29 June 2007
    0 references
    Public key cryptosystems are usually based on factoring large integers or computing discrete logarithms in suitably represented finite cyclic groups. Two exceptions are the public key schemes proposed by [\textit{P. J. Abisha, D. G. Thomas}, and \textit{K. G. Subramanian}, Progress in cryptology -- INDOCRYPT 2003. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2904, 218--227 (2003; Zbl 1123.94333)], which are based on partially commutative monoids and groups. Pitfalls in these cryptosystems were already considered by [\textit{F. Levy-dit-Vehel} and \textit{Perret}, Progress in cryptology -- INDOCRYPT 2004. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 3348, 275--289 (2004; Zbl 1113.94313)], who described some attacks which, despite being exponential on the size of the public alphabet \(\Delta\), could be fast enough to compromise the use of practical \(\Delta\). In this paper, it is shown that encryption schemes based on free partially commutative monoids are vulnerable to suitable \textit{ciphertext only} attacks as well, which is further evidence that such cryptosystems do not offer acceptable security.
    0 references
    public key cryptography
    0 references
    ciphertext only attacks
    0 references
    groups
    0 references
    monoids
    0 references

    Identifiers