Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem
Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC, and E1Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum algorithms have been found to be able to solve certain mathematical problems on no...
Gespeichert in:
Veröffentlicht in: | Science China. Information sciences 2016-05, Vol.59 (5), p.129-139, Article 052109 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 139 |
---|---|
container_issue | 5 |
container_start_page | 129 |
container_title | Science China. Information sciences |
container_volume | 59 |
creator | Liu, Jinhui Zhang, Huanguo Jia, Jianwei Wang, Houzhen Mao, Shaowu Wu, Wanqing |
description | Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC, and E1Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum algorithms have been found to be able to solve certain mathematical problems on non-commutative algebraic structures. Against this background, Raulynaitis et al. have proposed a novel asymmetric cipher protocol using a matrix decomposition problem. Their proposed scheme is vulnerable to a linear algebra attack based on the probable occurrence of weak keys in the generation process. In this paper, we show that the asymmetric cipher of the non-commutative cryptography scheme is vulnerable to a linear algebra attack and that it only requires polynomial time to obtain the equivalent keys for some given public keys. We also propose an improvement to enhance the scheme of Raulynaitis et al. |
doi_str_mv | 10.1007/s11432-015-5443-2 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918656074</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>668642791</cqvip_id><sourcerecordid>2918656074</sourcerecordid><originalsourceid>FETCH-LOGICAL-c386t-c198fae8db49e71e14d53f33580157000425c802b542a0899a32a816725183333</originalsourceid><addsrcrecordid>eNp9UE1LAzEQDaJgqf0B3oKeo_ncJEcpfkHBgwreQppm2y27m22yC-6_N2WL3pzLDMx78-Y9AK4JviMYy_tECGcUYSKQ4JwhegZmRBUaEU30eZ4LyZFk7OsSLFLa41yMYSrVDLwv49j1trX1mKoEQwltC20am8b3sXLQVd3OR9jF0AcXajikqt1CCxub199w411oupCqvgrtEbWufXMFLkpbJ7849Tn4fHr8WL6g1dvz6_JhhRxTRY8c0aq0Xm3WXHtJPOEbwUrGhMpGZP6RU-EUpmvBqcVKa8uoVdkLFUSxXHNwO93NuofBp97swxCzlWSozv5FgSXPKDKhXAwpRV-aLlaNjaMh2BzjM1N8JquaY3yGZg6dOClj262Pf5f_I92chHah3R4y71epKFTBqdSE_QDd43zD</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918656074</pqid></control><display><type>article</type><title>Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem</title><source>Alma/SFX Local Collection</source><source>SpringerLink Journals - AutoHoldings</source><source>ProQuest Central</source><creator>Liu, Jinhui ; Zhang, Huanguo ; Jia, Jianwei ; Wang, Houzhen ; Mao, Shaowu ; Wu, Wanqing</creator><creatorcontrib>Liu, Jinhui ; Zhang, Huanguo ; Jia, Jianwei ; Wang, Houzhen ; Mao, Shaowu ; Wu, Wanqing</creatorcontrib><description>Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC, and E1Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum algorithms have been found to be able to solve certain mathematical problems on non-commutative algebraic structures. Against this background, Raulynaitis et al. have proposed a novel asymmetric cipher protocol using a matrix decomposition problem. Their proposed scheme is vulnerable to a linear algebra attack based on the probable occurrence of weak keys in the generation process. In this paper, we show that the asymmetric cipher of the non-commutative cryptography scheme is vulnerable to a linear algebra attack and that it only requires polynomial time to obtain the equivalent keys for some given public keys. We also propose an improvement to enhance the scheme of Raulynaitis et al.</description><identifier>ISSN: 1674-733X</identifier><identifier>EISSN: 1869-1919</identifier><identifier>DOI: 10.1007/s11432-015-5443-2</identifier><language>eng</language><publisher>Beijing: Science China Press</publisher><subject>Algorithms ; Asymmetry ; Computer Science ; Computer systems ; Cryptography ; Decomposition ; ElGamal ; Encryption ; Information Systems and Communication Service ; Linear algebra ; Mathematical analysis ; Matrices (mathematics) ; Matrix algebra ; Polynomials ; Quantum computing ; Research Paper ; 代数攻击 ; 公钥密码体制 ; 分解问题 ; 密码协议 ; 矩阵 ; 离散对数问题 ; 非对称密码</subject><ispartof>Science China. Information sciences, 2016-05, Vol.59 (5), p.129-139, Article 052109</ispartof><rights>Science China Press and Springer-Verlag Berlin Heidelberg 2016</rights><rights>Science China Press and Springer-Verlag Berlin Heidelberg 2016.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c386t-c198fae8db49e71e14d53f33580157000425c802b542a0899a32a816725183333</citedby><cites>FETCH-LOGICAL-c386t-c198fae8db49e71e14d53f33580157000425c802b542a0899a32a816725183333</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/84009A/84009A.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11432-015-5443-2$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918656074?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21367,27901,27902,33721,41464,42533,43781,51294</link.rule.ids></links><search><creatorcontrib>Liu, Jinhui</creatorcontrib><creatorcontrib>Zhang, Huanguo</creatorcontrib><creatorcontrib>Jia, Jianwei</creatorcontrib><creatorcontrib>Wang, Houzhen</creatorcontrib><creatorcontrib>Mao, Shaowu</creatorcontrib><creatorcontrib>Wu, Wanqing</creatorcontrib><title>Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem</title><title>Science China. Information sciences</title><addtitle>Sci. China Inf. Sci</addtitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><description>Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC, and E1Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum algorithms have been found to be able to solve certain mathematical problems on non-commutative algebraic structures. Against this background, Raulynaitis et al. have proposed a novel asymmetric cipher protocol using a matrix decomposition problem. Their proposed scheme is vulnerable to a linear algebra attack based on the probable occurrence of weak keys in the generation process. In this paper, we show that the asymmetric cipher of the non-commutative cryptography scheme is vulnerable to a linear algebra attack and that it only requires polynomial time to obtain the equivalent keys for some given public keys. We also propose an improvement to enhance the scheme of Raulynaitis et al.</description><subject>Algorithms</subject><subject>Asymmetry</subject><subject>Computer Science</subject><subject>Computer systems</subject><subject>Cryptography</subject><subject>Decomposition</subject><subject>ElGamal</subject><subject>Encryption</subject><subject>Information Systems and Communication Service</subject><subject>Linear algebra</subject><subject>Mathematical analysis</subject><subject>Matrices (mathematics)</subject><subject>Matrix algebra</subject><subject>Polynomials</subject><subject>Quantum computing</subject><subject>Research Paper</subject><subject>代数攻击</subject><subject>公钥密码体制</subject><subject>分解问题</subject><subject>密码协议</subject><subject>矩阵</subject><subject>离散对数问题</subject><subject>非对称密码</subject><issn>1674-733X</issn><issn>1869-1919</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp9UE1LAzEQDaJgqf0B3oKeo_ncJEcpfkHBgwreQppm2y27m22yC-6_N2WL3pzLDMx78-Y9AK4JviMYy_tECGcUYSKQ4JwhegZmRBUaEU30eZ4LyZFk7OsSLFLa41yMYSrVDLwv49j1trX1mKoEQwltC20am8b3sXLQVd3OR9jF0AcXajikqt1CCxub199w411oupCqvgrtEbWufXMFLkpbJ7849Tn4fHr8WL6g1dvz6_JhhRxTRY8c0aq0Xm3WXHtJPOEbwUrGhMpGZP6RU-EUpmvBqcVKa8uoVdkLFUSxXHNwO93NuofBp97swxCzlWSozv5FgSXPKDKhXAwpRV-aLlaNjaMh2BzjM1N8JquaY3yGZg6dOClj262Pf5f_I92chHah3R4y71epKFTBqdSE_QDd43zD</recordid><startdate>20160501</startdate><enddate>20160501</enddate><creator>Liu, Jinhui</creator><creator>Zhang, Huanguo</creator><creator>Jia, Jianwei</creator><creator>Wang, Houzhen</creator><creator>Mao, Shaowu</creator><creator>Wu, Wanqing</creator><general>Science China Press</general><general>Springer Nature B.V</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20160501</creationdate><title>Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem</title><author>Liu, Jinhui ; Zhang, Huanguo ; Jia, Jianwei ; Wang, Houzhen ; Mao, Shaowu ; Wu, Wanqing</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c386t-c198fae8db49e71e14d53f33580157000425c802b542a0899a32a816725183333</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Algorithms</topic><topic>Asymmetry</topic><topic>Computer Science</topic><topic>Computer systems</topic><topic>Cryptography</topic><topic>Decomposition</topic><topic>ElGamal</topic><topic>Encryption</topic><topic>Information Systems and Communication Service</topic><topic>Linear algebra</topic><topic>Mathematical analysis</topic><topic>Matrices (mathematics)</topic><topic>Matrix algebra</topic><topic>Polynomials</topic><topic>Quantum computing</topic><topic>Research Paper</topic><topic>代数攻击</topic><topic>公钥密码体制</topic><topic>分解问题</topic><topic>密码协议</topic><topic>矩阵</topic><topic>离散对数问题</topic><topic>非对称密码</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Liu, Jinhui</creatorcontrib><creatorcontrib>Zhang, Huanguo</creatorcontrib><creatorcontrib>Jia, Jianwei</creatorcontrib><creatorcontrib>Wang, Houzhen</creatorcontrib><creatorcontrib>Mao, Shaowu</creatorcontrib><creatorcontrib>Wu, Wanqing</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Science China. Information sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Liu, Jinhui</au><au>Zhang, Huanguo</au><au>Jia, Jianwei</au><au>Wang, Houzhen</au><au>Mao, Shaowu</au><au>Wu, Wanqing</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem</atitle><jtitle>Science China. Information sciences</jtitle><stitle>Sci. China Inf. Sci</stitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><date>2016-05-01</date><risdate>2016</risdate><volume>59</volume><issue>5</issue><spage>129</spage><epage>139</epage><pages>129-139</pages><artnum>052109</artnum><issn>1674-733X</issn><eissn>1869-1919</eissn><abstract>Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC, and E1Gamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum algorithms have been found to be able to solve certain mathematical problems on non-commutative algebraic structures. Against this background, Raulynaitis et al. have proposed a novel asymmetric cipher protocol using a matrix decomposition problem. Their proposed scheme is vulnerable to a linear algebra attack based on the probable occurrence of weak keys in the generation process. In this paper, we show that the asymmetric cipher of the non-commutative cryptography scheme is vulnerable to a linear algebra attack and that it only requires polynomial time to obtain the equivalent keys for some given public keys. We also propose an improvement to enhance the scheme of Raulynaitis et al.</abstract><cop>Beijing</cop><pub>Science China Press</pub><doi>10.1007/s11432-015-5443-2</doi><tpages>11</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1674-733X |
ispartof | Science China. Information sciences, 2016-05, Vol.59 (5), p.129-139, Article 052109 |
issn | 1674-733X 1869-1919 |
language | eng |
recordid | cdi_proquest_journals_2918656074 |
source | Alma/SFX Local Collection; SpringerLink Journals - AutoHoldings; ProQuest Central |
subjects | Algorithms Asymmetry Computer Science Computer systems Cryptography Decomposition ElGamal Encryption Information Systems and Communication Service Linear algebra Mathematical analysis Matrices (mathematics) Matrix algebra Polynomials Quantum computing Research Paper 代数攻击 公钥密码体制 分解问题 密码协议 矩阵 离散对数问题 非对称密码 |
title | Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T13%3A11%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cryptanalysis%20of%20an%20asymmetric%20cipher%20protocol%20using%20a%20matrix%20decomposition%20problem&rft.jtitle=Science%20China.%20Information%20sciences&rft.au=Liu,%20Jinhui&rft.date=2016-05-01&rft.volume=59&rft.issue=5&rft.spage=129&rft.epage=139&rft.pages=129-139&rft.artnum=052109&rft.issn=1674-733X&rft.eissn=1869-1919&rft_id=info:doi/10.1007/s11432-015-5443-2&rft_dat=%3Cproquest_cross%3E2918656074%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918656074&rft_id=info:pmid/&rft_cqvip_id=668642791&rfr_iscdi=true |