Abstract
This paper shows that an eavesdropper can always recover efficiently the private key of one of the two parts of the public key cryptography protocol introduced by Shpilrain and Ushakov (ACNS 2005, Lecture Notes in Comput. Sci., vol. 3531, pp. 151-163, 2005). Thus an eavesdropper can always recover the shared secret key, making the protocol insecure. © 2007 International Association for Cryptologic Research.
Author supplied keywords
Cite
CITATION STYLE
APA
Matucci, F. (2008). Cryptanalysis of the shpilrain-ushakov protocol for Thompson’s group. Journal of Cryptology, 21(3), 458–468. https://doi.org/10.1007/s00145-007-9016-4
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.
Already have an account? Sign in
Sign up for free