Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Journal of Mathematical Cryptology

Managing Editor: Magliveras, Spyros S. / Steinwandt, Rainer / Trung, Tran

Editorial Board Member: Blackburn, Simon R. / Blundo, Carlo / Burmester, Mike / Cramer, Ronald / Dawson, Ed / Gilman, Robert / Gonzalez Vasco, Maria Isabel / Grosek, Otokar / Helleseth, Tor / Kim, Kwangjo / Koblitz, Neal / Kurosawa, Kaoru / Lauter, Kristin / Lange, Tanja / Menezes, Alfred / Nguyen, Phong Q. / Pieprzyk, Josef / Rötteler, Martin / Safavi-Naini, Rei / Shparlinski, Igor E. / Stinson, Doug / Takagi, Tsuyoshi / Williams, Hugh C. / Yung, Moti

4 Issues per year


CiteScore 2016: 0.74

SCImago Journal Rank (SJR) 2016: 0.463
Source Normalized Impact per Paper (SNIP) 2016: 0.778

Mathematical Citation Quotient (MCQ) 2016: 0.16

Online
ISSN
1862-2984
See all formats and pricing
More options …

Cryptanalysis of the shifted conjugacy authentication protocol

Jonathan Longrigg / Alexander Ushakov
Published Online: 2008-09-11 | DOI: https://doi.org/10.1515/JMC.2008.005

Abstract

In this paper we present the first practical attack on the shifted conjugacy-based authentication protocol proposed by P. Dehornoy in [P. Dehornoy, Using shifted conjugacy in braid-based cryptography, Algebraic Methods in Cryptography, Contemporary Mathematics 418, American Mathematical Society, 2006, pp. 65–74.]. We discuss the weaknesses of that primitive and propose ways to improve the protocol.

Keywords.: Braid group cryptography; authentication protocol; shifted conjugacy; ultra summit set; centralizer

About the article

Received: 2007-04-18

Revised: 2007-11-08

Published Online: 2008-09-11

Published in Print: 2008-07-01


Citation Information: Journal of Mathematical Cryptology, ISSN (Online) 1862-2984, ISSN (Print) 1862-2976, DOI: https://doi.org/10.1515/JMC.2008.005.

Export Citation

Citing Articles

Here you can find all Crossref-listed publications in which this article is cited. If you would like to receive automatic email messages as soon as this article is cited in other publications, simply activate the “Citation Alert” on the top of this page.

[1]
Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li, and Yixian Yang
Security and Communication Networks, 2012, Volume 5, Number 7, Page 809

Comments (0)

Please log in or register to comment.
Log in