An algebraic method for public-key cryptography (Q1574733): Difference between revisions
From MaRDI portal
Created a new Item |
Set OpenAlex properties. |
||
(4 intermediate revisions by 3 users not shown) | |||
Property / author | |||
Property / author: Iris Lee Anshel / rank | |||
Property / reviewed by | |||
Property / reviewed by: Karl-Heinz Zimmermann / rank | |||
Property / author | |||
Property / author: Iris Lee Anshel / rank | |||
Normal rank | |||
Property / reviewed by | |||
Property / reviewed by: Karl-Heinz Zimmermann / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.4310/mrl.1999.v6.n3.a3 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W1976904648 / rank | |||
Normal rank | |||
links / mardi / name | links / mardi / name | ||
Latest revision as of 08:33, 30 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | An algebraic method for public-key cryptography |
scientific article |
Statements
An algebraic method for public-key cryptography (English)
0 references
13 August 2000
0 references
A key establishment protocol is a protocol whereby a shared secret becomes available to two or more parties, for subsequent cryptographic applications. The paper describes an algebraic key establishment protocol for secret key establishment between two individuals communicating over a public channel. This protocol is based on feasibly computable monoids and the foundation of the method lies in the difficulty of solving equations over algebraic structures. As an example, a group-theoretic implementation of the protocol is given. Here an adversary observing all communications over the public channel can break the scheme and determine the secret key provided that a system of conjugacy equations over the associated group is feasibly solvable.
0 references
public-key cryptography
0 references
key establishment
0 references
group-theoretic implementation
0 references