Home Mathematics A Practical Attack on a Certain Braid Group Based Shifted Conjugacy Authentication Protocol
Article
Licensed
Unlicensed Requires Authentication

A Practical Attack on a Certain Braid Group Based Shifted Conjugacy Authentication Protocol

  • Jonathan Longrigg and Alexander Ushakov
Published/Copyright: March 10, 2010
Become an author with De Gruyter Brill
Groups Complexity Cryptology
From the journal Volume 1 Issue 2

In this paper we modify the technique of cyclic permutations to work with the shifted conjugacy problem. We apply this technique to design a heuristic attack on the cryptographic authentication scheme based on shifted conjugacy of braids proposed by Dehornoy in [Using shifted conjugacy in braid-based cryptography, American Mathematical Society, 2006] and report experimental results.

Received: 2008-07-28
Revised: 2009-02-01
Published Online: 2010-03-10
Published in Print: 2009-October

© Heldermann Verlag

Downloaded on 22.12.2025 from https://www.degruyterbrill.com/document/doi/10.1515/GCC.2009.275/pdf
Scroll to top button