Thompson's group and public key cryptography
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
An authentication scheme based on the twisted conjugacy problem
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Cryptanalysis of Stickel's key exchange scheme
CSR'08 Proceedings of the 3rd international conference on Computer science: theory and applications
Hi-index | 0.00 |
We introduce a new approach for cryptanalysis of key agreement protocols based on noncommutative groups. Our approach uses functions that estimate the distance of a group element to a given subgroup. We test it against the Shpilrain-Ushakov protocol, which is based on Thompson's group F, and show that it can break about half the keys within a few seconds on a single PC.