Cryptanalysis of the shifted conjugacy authentication protocol

Jonathan Longrigg, Alexander Ushakov

Research output: Contribution to journalArticlepeer-review

10 Scopus citations

Abstract

In this paper we present the first practical attack on the shifted conjugacy-based authentication protocol proposed by P. Dehornoy in [5]. We discuss the weaknesses of that primitive and propose ways to improve the protocol.

Original languageEnglish
Pages (from-to)109-116
Number of pages8
JournalJournal of Mathematical Cryptology
Volume2
Issue number2
DOIs
StatePublished - Jul 2008

Keywords

  • Authentication protocol
  • Braid group cryptography
  • Centralizer
  • Shifted conjugacy
  • Ultra summit set

Fingerprint

Dive into the research topics of 'Cryptanalysis of the shifted conjugacy authentication protocol'. Together they form a unique fingerprint.

Cite this