Mathematics – Group Theory
Scientific paper
2006-07-07
Journal of Cryptology 21(3) (2008) 458--468
Mathematics
Group Theory
12 pages, 4 figures; final version
Scientific paper
This paper shows that an eavesdropper can always recover efficiently the
private key of one of the two parts of the public key cryptography protocol
introduced by Shpilrain and Ushakov in [9]. Thus an eavesdropper can always
recover the shared secret key, making the protocol insecure.
No associations
LandOfFree
Cryptanalysis of the Shpilrain-Ushakov Protocol in Thompson's Group does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Cryptanalysis of the Shpilrain-Ushakov Protocol in Thompson's Group, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptanalysis of the Shpilrain-Ushakov Protocol in Thompson's Group will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-97393