2007
DOI: 10.1007/s10623-007-9123-0
|View full text |Cite
|
Sign up to set email alerts
|

Towards generating secure keys for braid cryptography

Abstract: Braid cryptosystem was proposed in CRYPTO 2000 as an alternate public-key cryptosystem. The security of this system is based upon the conjugacy problem in braid groups. Since then, there have been several attempts to break the braid cryptosystem by solving the conjugacy problem in braid groups. In this article, we first survey all the major attacks on the braid cryptosystem and conclude that the attacks were successful because the current ways of random key generation almost always result in weaker instances o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…If the private keys are selected carefully, all known heuristic attacks on braid-based schemes will be unsuccessful [20]. According to [7], the complexity of carrying brute force attacks towards braid-based schemes is proportional to exp( 1 2 ln log n), where n and l are the braid index and the canonical length of the involved braids.…”
Section: Security Levelsmentioning
confidence: 99%
See 3 more Smart Citations
“…If the private keys are selected carefully, all known heuristic attacks on braid-based schemes will be unsuccessful [20]. According to [7], the complexity of carrying brute force attacks towards braid-based schemes is proportional to exp( 1 2 ln log n), where n and l are the braid index and the canonical length of the involved braids.…”
Section: Security Levelsmentioning
confidence: 99%
“…For details regarding the ways to construct such a CSP-hard pair generator, please refer to [10,16,20,26]. In particular in [20], Ko et al proposed several promising ways to generate hard instances of the conjugacy problem for braid cryptography.…”
Section: Braid Sampling System Parameters and Key Generationmentioning
confidence: 99%
See 2 more Smart Citations
“…Below we mention a few of them without going into details. In [3,4,20,19], the authors suggest to use the braid groups as platform groups for their respective protocols. In [25] the authors propose a PKC scheme whose security is based on the DLP problem for the automorphism defined by the conjugation operation and the difficulty to find the conjugate element on finite nonabelian groups.…”
Section: Introductionmentioning
confidence: 99%