2011
DOI: 10.3934/amc.2011.5.87
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of a 2-party key establishment based on a semigroup action problem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…The upper bound for the size of this set is 2 100 and the least value is 2 25 . The cryptanalysis of this example has been done in [20] and the choice of the above parameters is considered insufficient for practical use. According to the cryptanalysis discussed in [20], if the above parameters are used, then a complete session key can be recovered easily.…”
Section: Security Of Sap and Cryptographic Protocols Against Brute Fomentioning
confidence: 99%
See 1 more Smart Citation
“…The upper bound for the size of this set is 2 100 and the least value is 2 25 . The cryptanalysis of this example has been done in [20] and the choice of the above parameters is considered insufficient for practical use. According to the cryptanalysis discussed in [20], if the above parameters are used, then a complete session key can be recovered easily.…”
Section: Security Of Sap and Cryptographic Protocols Against Brute Fomentioning
confidence: 99%
“…The cryptanalysis of this example has been done in [20] and the choice of the above parameters is considered insufficient for practical use. According to the cryptanalysis discussed in [20], if the above parameters are used, then a complete session key can be recovered easily. Therefore, the parameters choices prescribed in [11] is not suggested for practical use and further research is required to achieve a good bound with better choice of parameters.…”
Section: Security Of Sap and Cryptographic Protocols Against Brute Fomentioning
confidence: 99%
“…d) In [8,Example 5.13] the authors illustrate the use of a semiring of order 6 to construct an example of a practical SAP. This was later cryptanalyzed in [16] due not to a general attack, but rather to the structure of this ring. However, we can use the semiring of order 20 given in [8,Example 5.8] to analogously define another SAP and its cryptanalysis is still an open question.…”
Section: Examplesmentioning
confidence: 99%
“…In 2007, Maze, Monico, and Rosenthal proposed one of the first cryptosystems based on semigroups and semirings [9], using some ideas from [10], as well as from their previous article [11]. However, then it was broken by Steinwandt et al [12]. Atani published a cryptosystem using semimodules over factor semirings [13].…”
Section: Introductionmentioning
confidence: 99%