Abstract
In this paper we present the first practical attack on the shifted conjugacy-based authentication protocol proposed by P. Dehornoy in [5]. We discuss the weaknesses of that primitive and propose ways to improve the protocol.
| Original language | English |
|---|---|
| Pages (from-to) | 109-116 |
| Number of pages | 8 |
| Journal | Journal of Mathematical Cryptology |
| Volume | 2 |
| Issue number | 2 |
| DOIs | |
| State | Published - Jul 2008 |
Keywords
- Authentication protocol
- Braid group cryptography
- Centralizer
- Shifted conjugacy
- Ultra summit set
Fingerprint
Dive into the research topics of 'Cryptanalysis of the shifted conjugacy authentication protocol'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver