RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika // Archive

Prikl. Diskr. Mat., 2015 Number 2(28), Pages 46–53 (Mi pdm505)

This article is cited in 5 papers

Mathematical Methods of Cryptography

Cryptanalysis of Ushakov–Shpilrain's authentication protocol based on the twisted conjugacy problem

M. N. Gornova, E. G. Kukina, V. A. Romankov

Omsk State University, Omsk, Russia

Abstract: We give a cryptanalysis of Ushakov–Shpilrain's authentication protocol based on the twisted conjugacy problem for a pair of endomorphisms on the semigroup of all $2\times2$ matrices over the ring of truncated one-variable polynomials over the field $\mathbb F_2$. It is shown that the private key of the protocol can be computed by solving the system of linear equations over $\mathbb F_2$. We present a theoretical estimation for the complexity of this cryptanalysis and describe practical results obtained in a computer experiment. It is shown that the protocol is theoretically and practically vulnerable.

Keywords: cryptography, authentication, endomorphism, twisted conjugacy, truncated polynomials.

UDC: 512.54

DOI: 10.17223/20710410/28/5



Bibliographic databases:


© Steklov Math. Inst. of RAS, 2024