Cryptanalysis of the shifted conjugacy authentication protocol
From MaRDI portal
Publication:3537518
Abstract: In this paper we present the first practical attack on the shifted conjugacy-based authentication protocol proposed by P. Dehornoy. We discuss the weaknesses of that primitive and propose ways to improve the protocol.
Recommendations
- CRYPTANALYSIS OF USHAKOV — SHPILRAIN’S AUTHENTICATION PROTOCOL BASED ON THE TWISTED CONJUGACY PROBLEM
- A practical attack on a certain braid group based shifted conjugacy authentication protocol
- scientific article; zbMATH DE number 2006822
- Cryptanalysis of the modified authenticated key agreement scheme
- Cryptanalysis of Tseng et al.'s authenticated encryption schemes
- Cryptanalysis of the improved authenticated key agreement protocol
- Information Security and Privacy
- scientific article; zbMATH DE number 1406774
Cites work
Cited in
(15)- Using shifted conjugacy in braid-based cryptography
- Biased bit commitment based on the twisted conjugacy search problem
- Cryptanalysis of the Convex Hull Click Human Identification Protocol
- Cryptanalysis and improvements on some graph-based authentication schemes
- Mean-set attack: cryptanalysis of Sibert et al. authentication protocol
- Subgroup conjugacy problem for Garside subgroups of Garside groups
- Cryptanalysis of an authentication scheme using truncated polynomials
- Groups with two generators having unsolvable word problem and presentations of Mihailova subgroups of braid groups
- CRYPTANALYSIS OF USHAKOV — SHPILRAIN’S AUTHENTICATION PROTOCOL BASED ON THE TWISTED CONJUGACY PROBLEM
- Cryptanalysis of the Shpilrain-Ushakov protocol for Thompson's group
- scientific article; zbMATH DE number 1406774 (Why is no real title available?)
- Cryptanalysis of matrix conjugation schemes
- The braid shelf
- A practical attack on a certain braid group based shifted conjugacy authentication protocol
- Authentication from matrix conjugation
This page was built for publication: Cryptanalysis of the shifted conjugacy authentication protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3537518)