Towards generating secure keys for braid cryptography

Cited 14 time in webofscience Cited 0 time in scopus
  • Hit : 1273
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKo, Ki-Hyoungko
dc.contributor.authorLee, JWko
dc.contributor.authorThomas, Tko
dc.date.accessioned2013-03-07T18:56:35Z-
dc.date.available2013-03-07T18:56:35Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2007-12-
dc.identifier.citationDESIGNS CODES AND CRYPTOGRAPHY, v.45, no.3, pp.317 - 333-
dc.identifier.issn0925-1022-
dc.identifier.urihttp://hdl.handle.net/10203/90993-
dc.description.abstractBraid cryptosystem was proposed in CRYPTO 2000 as an alternate public-key cryptosystem. The security of this system is based upon the conjugacy problem in braid groups. Since then, there have been several attempts to break the braid cryptosystem by solving the conjugacy problem in braid groups. In this article, we first survey all the major attacks on the braid cryptosystem and conclude that the attacks were successful because the current ways of random key generation almost always result in weaker instances of the conjugacy problem. We then propose several alternate ways of generating hard instances of the conjugacy problem for use braid cryptography.-
dc.languageEnglish-
dc.publisherSPRINGER-
dc.subjectCONJUGACY PROBLEM-
dc.subjectPRACTICAL ATTACK-
dc.subjectCRYPTOSYSTEM-
dc.subjectPROTOCOL-
dc.titleTowards generating secure keys for braid cryptography-
dc.typeArticle-
dc.identifier.wosid000250235000003-
dc.identifier.scopusid2-s2.0-35349005265-
dc.type.rimsART-
dc.citation.volume45-
dc.citation.issue3-
dc.citation.beginningpage317-
dc.citation.endingpage333-
dc.citation.publicationnameDESIGNS CODES AND CRYPTOGRAPHY-
dc.identifier.doi10.1007/s10623-007-9123-0-
dc.contributor.localauthorKo, Ki-Hyoung-
dc.contributor.nonIdAuthorLee, JW-
dc.contributor.nonIdAuthorThomas, T-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorbraid groups-
dc.subject.keywordAuthorconjugacy problem-
dc.subject.keywordAuthorbraid cryptography-
dc.subject.keywordPlusCONJUGACY PROBLEM-
dc.subject.keywordPlusPRACTICAL ATTACK-
dc.subject.keywordPlusCRYPTOSYSTEM-
dc.subject.keywordPlusPROTOCOL-
Appears in Collection
MA-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 14 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0