Showing a limited preview of this publication:
Abstract.
We consider a key exchange procedure whose security is based on the difficulty of computing discrete logarithms in a group, and where exponentiation is hidden by a conjugation. We give a platform-dependent cryptanalysis of this protocol. Finally, to take full advantage of this procedure, we propose a group of matrices over a noncommutative ring as platform group.
Received: 2011-11-30
Published Online: 2012-05-01
Published in Print: 2012-May
© 2012 by Walter de Gruyter Berlin Boston