Cryptanalysis of a Cryptosystem with Non- Commutative Platform Groups
Cryptanalysis of a Cryptosystem with Non-Commutative Platform Groups作者机构:College of Computer Science Shaanxi Normal University Xi'an Shanxi China Computer School of Wuhan University Wuhan Hubei China Key Laboratory of Aerospace Information security and trusted computing Ministry of Education Wuhan University Wuhan Hubei China School of Computer Science and Technology Hebei University Baoding China
出 版 物:《China Communications》 (中国通信(英文版))
年 卷 期:2018年第15卷第2期
页 面:67-73页
核心收录:
学科分类:07[理学] 070104[理学-应用数学] 0701[理学-数学]
基 金:supported by the State Key Program of National Natural Science of China(Grant Nos. 61332019) the National Natural Science Foundation of China (61572303) National Key Research and Development Program of China ( 2017YFB0802003 , 2017YFB0802004) National Cryptography Development Fund during the 13th Five-year Plan Period (MMJJ20170216) the Foundation of State Key Laboratory of Information Security (2017-MS-03) the Fundamental Research Funds for the Central Universities(GK201702004,GK201603084) Major State Basic Research Development Program of China (973 Program) (No.2014CB340600) National High-tech R&D Program of China(2015AA016002, 2015AA016004) Natural Science Foundation of He Bei Province (No. F2017201199) Science and technology research project of Hebei higher education (No. QN2017020)
主 题:cryptanalysis post-quantum com-putational cryptography conjugator searchproblem computational complexity
摘 要:A cryptosystem with non-commutative platform groups based on conjugator search problem was recently introduced at Neural Computing and Applications 2016. Its versatility was illustrated by building a public-key encryption scheme. We propose an algebraic key-recovery attack in the polynomial computational complexity. Furthermore, we peel off the encryption and decryption process and propose attack methods for solving the conjugator search problem over the given non-abelian group. Finally, we provide corresponding practical attack examples to illustrate the attack methods in our cryptanalysis, and provide some improved suggestions.