Handbook of Applied Cryptography
Handbook of Applied Cryptography
A New Method for Exchanging Secret Keys
ICITA '05 Proceedings of the Third International Conference on Information Technology and Applications (ICITA'05) Volume 2 - Volume 02
Cryptanalysis of group-based key agreement protocols using subgroup distance functions
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Thompson's group and public key cryptography
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
A practical attack on a braid group based cryptographic protocol
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Cryptanalysis of Álvarez et al. key exchange scheme
Information Sciences: an International Journal
Hi-index | 0.01 |
We offer cryptanalysis of a key exchange scheme due to Stickel [11], which was inspired by the well-known Diffie-Hellman protocol. We show that Stickel's choice of platform (the group of invertible matrices over a finite field) makes the scheme vulnerable to linear algebra attacks with very high success rate in recovering the shared secret key (100% in our experiments). We also show that obtaining the shared secret key in Stickel's scheme is not harder for the adversary than solving the decomposition search problem in the platform (semi)group.