Skip to content
BY-NC-ND 3.0 license Open Access Published by De Gruyter March 6, 2014

Cryptanalysis of matrix conjugation schemes

  • Alex D. Myasnikov EMAIL logo and Alexander Ushakov

Abstract.

In this paper we cryptanalyze two protocols: the Grigoriev–Shpilrain authentication protocol and a public key cryptosystem due to Wang, Wang, Cao, Okamoto and Shao. Both of these protocols use the computational hardness of some variations of the conjugacy search problem in a class of noncommutative monoids. We devise a practical heuristic algorithm solving those problems. As a conclusion we claim that these protocols are insecure for the proposed parameter values.

MSC: 94A60; 68W30

Funding source: NSF

Award Identifier / Grant number: DMS-0914773, DMS-1318716

The authors would like to thank the anonymous referees for their valuable comments and suggestions.

Received: 2012-12-18
Revised: 2013-11-27
Accepted: 2014-1-29
Published Online: 2014-3-6
Published in Print: 2014-6-1

© 2014 by Walter de Gruyter Berlin/Boston

This article is distributed under the terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

Downloaded on 14.5.2024 from https://www.degruyter.com/document/doi/10.1515/jmc-2012-0033/html
Scroll to top button