Abstract
We investigate two schemes based on the word problem on groups. From a complexity-theoretic point of view, we show that the problems underlying those schemes are equivalent. We then present a reaction attack on one of the schemes, thus easily transposed to the other. The attack, besides its efficiency, permits to recover an equivalent secret key.
This is a preview of subscription content,log in via an institution to check access.
Access this article
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Price includes VAT (Japan)
Instant access to the full article PDF.
Similar content being viewed by others
References
Abisha P.J., Thomas D.G., Subramanian K.G.: Public key cryptosystems based on free partially commutative monoids and groups. In: Proceedings of INDOCRYPT 2003, LNCS, vol. 2904, pp. 218–227. Springer, Berlin, Heidelberg (2003).
Book R.V.: Confluent and other types of thue systems. J. ACM29, 171–182 (1982)
Book R.V., Otto F.: String-Rewriting Systems. Texts and Monographs in Computer Science. Springer-Verlag, New York (1993).
González-Vasco M.I., Steinwandt R.: Pitfalls in public key systems based on free partially commutative monoids and groups. Appl. Math. Lett.19(10), 1037–1041 (2006)
González-Vasco M.I., Steinwandt R.: A reaction attack on a public key cryptosystem based on the word problem. Appl. Algebra Eng. Commun. Comput.14(5), 335–340 (2004)
Levy-dit-Vehel F., Perret L.: On the Wagner–Magyarik cryptosystem. Revised Selected Papers of WCC 2005 Conference, LNCS, vol. 3969, pp. 316–329. Springer, Berlin (2006).
Novikov P.S.: On the algorithmic unsolvability of the word problem in group theory. Trudy Mat. Inst. Steklov44, 1–143 (1955)
Wagner N.R., Magyarik M.R.: A public key cryptosystem based on the word problem. In: Proceedings of CRYPTO’84, LNCS, vol. 96, pp. 19–36. Springer-Verlag, Berlin.
Wrathall C.: The word problem for free partially commutative groups. J. Symb. Comput.6, 99–104 (1988)
Author information
Authors and Affiliations
ENSTA, 32 Boulevard Victor, 75739, Paris Cedex 15, France
Françoise Levy-dit-Vehel
LIP6/INRIA/SALSA, University Paris 6, Site Passy-Kennedy 104 avenue du Président Kennedy, 75016, Paris, France
Ludovic Perret
- Françoise Levy-dit-Vehel
You can also search for this author inPubMed Google Scholar
- Ludovic Perret
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toFrançoise Levy-dit-Vehel.
Additional information
Communicated by P. Wild.
Rights and permissions
About this article
Cite this article
Levy-dit-Vehel, F., Perret, L. Security analysis of word problem-based cryptosystems.Des. Codes Cryptogr.54, 29–41 (2010). https://doi.org/10.1007/s10623-009-9307-x
Received:
Revised:
Accepted:
Published:
Issue Date:
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative