On the security of MOR public key cryptosystem

5Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

For a finite group G to be used in the MOR public key cryptosystem, it is necessary that the discrete logarithm problem(DLP) over the inner automorphism group Inn(G) of G must be computationally hard to solve. In this paper, under the assumption that the special conjugacy problem of G is easy, we show that the complexity of the MOR system over G is about log|G| times larger than that of DLP over G in a generic sense. We also introduce a group-theoretic method, called the group extension, to analyze the MOR cryptosystem. When G is considered as a group extension of H by a simple abelian group, we show that DLP over Inn(G) can be 'reduced' to DLP over Inn(H). On the other hand, we show that the reduction from DLP over Inn(G) to DLP over G is also possible for some groups. For example, when G is a nilpotent group, we obtain such a reduction by the central commutator attack. © International Association for Cryptologic Research 2004.

Cite

CITATION STYLE

APA

Lee, I. S., Kim, W. H., Kwon, D., Nahm, S., Kwak, N. S., & Baek, Y. J. (2004). On the security of MOR public key cryptosystem. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3329, 387–400. https://doi.org/10.1007/978-3-540-30539-2_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free