Jump to ContentJump to Main Navigation
Show Summary Details

Journal of Mathematical Cryptology

Managing Editor: Magliveras, Spyros S. / Steinwandt, Rainer / Trung, Tran

Editorial Board Member: Blackburn, Simon R. / Blundo, Carlo / Burmester, Mike / Cramer, Ronald / Dawson, Ed / Gilman, Robert / Gonzalez Vasco, Maria Isabel / Grosek, Otokar / Helleseth, Tor / Kim, Kwangjo / Koblitz, Neal / Kurosawa, Kaoru / Lauter, Kristin / Lange, Tanja / Menezes, Alfred / Nguyen, Phong Q. / Pieprzyk, Josef / Rötteler, Martin / Safavi-Naini, Rei / Shparlinski, Igor E. / Stinson, Doug / Takagi, Tsuyoshi / Williams, Hugh C. / Yung, Moti

4 Issues per year

SCImago Journal Rank (SJR) 2015: 0.313
Source Normalized Impact per Paper (SNIP) 2015: 0.749
Impact per Publication (IPP) 2015: 0.396

Mathematical Citation Quotient (MCQ) 2015: 0.24

See all formats and pricing

Cryptanalysis of the shifted conjugacy authentication protocol

Jonathan Longrigg / Alexander Ushakov
  • Department of Mathematics, Stevens Institute of Technology, Hoboken, NJ 07030, USA. Email:
Published Online: 2008-09-11 | DOI: https://doi.org/10.1515/JMC.2008.005


In this paper we present the first practical attack on the shifted conjugacy-based authentication protocol proposed by P. Dehornoy in [P. Dehornoy, Using shifted conjugacy in braid-based cryptography, Algebraic Methods in Cryptography, Contemporary Mathematics 418, American Mathematical Society, 2006, pp. 65–74.]. We discuss the weaknesses of that primitive and propose ways to improve the protocol.

Keywords.: Braid group cryptography; authentication protocol; shifted conjugacy; ultra summit set; centralizer

About the article

Received: 2007-04-18

Revised: 2007-11-08

Published Online: 2008-09-11

Published in Print: 2008-07-01

Citation Information: Journal of Mathematical Cryptology, ISSN (Online) 1862-2984, ISSN (Print) 1862-2976, DOI: https://doi.org/10.1515/JMC.2008.005. Export Citation

Citing Articles

Here you can find all Crossref-listed publications in which this article is cited. If you would like to receive automatic email messages as soon as this article is cited in other publications, simply activate the “Citation Alert” on the top of this page.

Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li, and Yixian Yang
Security and Communication Networks, 2012, Volume 5, Number 7, Page 809

Comments (0)

Please log in or register to comment.
Log in