Home A linear decomposition attack
Article
Licensed
Unlicensed Requires Authentication

A linear decomposition attack

  • Alexei Myasnikov EMAIL logo and Vitaliĭ Roman'kov
Published/Copyright: April 18, 2015
Become an author with De Gruyter Brill

Abstract

We discuss a new attack, termed a dimension or linear decomposition attack, on several known group-based cryptosystems. This attack gives a polynomial time deterministic algorithm that recovers the secret shared key from the public data in all the schemes under consideration. Furthermore, we show that in this case, contrary to the common opinion, the typical computational security assumptions are not very relevant to the security of the schemes, i.e., one can break the schemes without solving the algorithmic problems on which the assumptions are based.

MSC: 94A60; 20F10

Funding source: NSF

Award Identifier / Grant number: DMS-1318716

Funding source: RFBR

Award Identifier / Grant number: 13-01-00239a

Funding source: Russian Research Fund

Award Identifier / Grant number: 14-11-00085

Received: 2015-1-8
Published Online: 2015-4-18
Published in Print: 2015-5-1

© 2015 by De Gruyter

Downloaded on 28.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/gcc-2015-0007/html
Scroll to top button