publication . Preprint . Conference object . 2014

Heisenberg Groups as Platform for the AAG Key-Exchange Protocol

Delaram Kahrobaei; Ha T. Lam;
Open Access English
  • Published: 17 Mar 2014
Abstract
Garber, Kahrobaei, and Lam studied polycyclic groups generated by number field as platform for the AAG key-exchange protocol. In this paper, we discuss the use of a different kind of polycyclic groups, Heisenberg groups, as a platform group for AAG by submitting Heisenberg groups to one of AAG's major attacks, the length-based attack.
Subjects
free text keywords: Computer Science - Cryptography and Security, Mathematics - Group Theory, Braid group, Ask price, Key exchange, Computer science, Public-key cryptography, business.industry, business, Computer network, Cryptographic protocol, Polycyclic group
Related Organizations
23 references, page 1 of 2

[1] I. Anshel, M. Anshel, and D. Goldfeld. An algebraic method for public-key cryptography. Mathematical Research Letters, 6:287-291, 1999.

[2] M. Anshel and D. Kahrobaei. Decision and search in non-abelian Cramer-Shoup public key cryptosystem. Groups, Complexity, Cryptology, 1:217-225, 2009.

[3] Ernst Binz and Sonja Pods. The geometry of Heisenberg groups: with applications in signal theory, optics, quantization, and field quantization, volume 151. American Mathematical Soc., 2008. [OpenAIRE]

[4] B. Eick and D. Kahrobaei. Polycyclic groups: a new platform for cryptography? Technical report, 2004. http://arxiv.org/abs/math/0411077. [OpenAIRE]

[5] B. Eick and W. Nickel. Polycyclic: Computation with polycyclic groups, a GAP 4 package, http: // www. gap-system. org/ Packages/ polycyclic. html .

[6] Bettina Eick. Algorithms for polycyclic groups. Habilitationsschrift, Universitt Kassel, 2000, 113 p.

[7] David Epstein, MS Paterson, JW Cannon, DF Holt, SV Levy, and William P Thurston. Word processing in groups. AK Peters, Ltd., 1992.

[8] The GAP Group. GAP - Groups, Algorithms, and Programming, Version 4.7.2, http: // www. gap-system. org , 2013.

[9] D. Garber, D. Kahrobaei, and H. T. Lam. Analyzing the Length-Based Attack on Polycyclic Groups. May 2013. http://arxiv.org/abs/1305.0548.

[10] D. Garber, S. Kaplan, M. Teicher, B. Tsaban, and U. Vishne. Probabilistic solutions of equations in the braid group. Advances in Applied Mathematics 35, pages 323-334, 2005.

[11] D. Garber, S. Kaplan, M. Teicher, B. Tsaban, and U. Vishne. Length-based conjugacy search in the braid group. Contemporary Mathematics 418, pages 75-87, 2006.

[12] Dennis Hofheinz and Rainer Steinwandt. A practical attack on some braid group based cryptographic primitives. Springer, 2002. [OpenAIRE]

[13] D. F. Holt, B. Eick, and E. A. O'Brien. Handbook of computational group theory. Chapman & Hall CRC, 2005.

[14] J. Hughes and A. Tannenbaum. Length-based attacks for certain group based encryption rewriting systems. Workshop SECI02 Securite de la Communication sur Internet, 2002.

[15] D. Kahrobaei and B. Khan. A non-commutative generalization of El-Gamal key exchange using polycyclic groups. Proceedings of the Global Telecommunications Conference, 4(2), 2006.

23 references, page 1 of 2
Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Preprint . Conference object . 2014

Heisenberg Groups as Platform for the AAG Key-Exchange Protocol

Delaram Kahrobaei; Ha T. Lam;