Skip to main content
Log in

Weak Keys in MST1

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

The public key cryptosystem MST1 has been introduced by Magliveras et al. [12] (Public Key Cryptosystems from Group Factorizations. Jatra Mountain Mathematical Publications). Its security relies on the hardness of factoring with respect to wild logarithmic signatures. To identify ‘wild-like’ logarithmic signatures, the criterion of being totally-non-transversal has been proposed. We present tame totally-non-transversal logarithmic signatures for the alternating and symmetric groups of degree ≥ 5. Hence, basing a key generation procedure on the assumption that totally-non-transversal logarithmic signatures are ‘wild like’ seems critical. We also discuss the problem of recognizing ‘weak’ totally-non-transversal logarithmic signatures, and demonstrate that another proposed key generation procedure based on permutably transversal logarithmic signatures may produce weak keys.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. W. Bosma J. Cannon C. Playoust (1997) ArticleTitleThe Magma Algebra System I: The User Language Journal of Symbolic Computation 24 235–265 Occurrence Handle10.1006/jsco.1996.0125 Occurrence HandleMR1484478

    Article  MathSciNet  Google Scholar 

  2. C. A. Cusack Group Factorizations in Cryptography. PhD thesis, University of Nebraska (2000).

  3. M.I.G. Vasco R. Steinwandt (2002) ArticleTitleObstacles in two public-key cryptosystems based on group factorizations Tatra Mountains Mathematical Publications 25 23–37

    Google Scholar 

  4. The GAP Team. GAP—Groups, Algorithms and Programming. Lehrstuhl D für Mathematik, RWTH Aachen, Germany and School of Mathematical and Computational Sciences, Univ. St. Andrews, Scotland (1997).

  5. M.I.González Vasco C. Martínez R. Steinwandt (2004) ArticleTitleTowards a uniform description of several group based cryptographic primitives Designs, Codes and Cryptography 33 215–226

    Google Scholar 

  6. M.I. González Vasco M. Rötteler R. Steinwandt (2003) ArticleTitleOn minimal length factorizations of finite groups. Experimental Mathematics 12 IssueID1 1–12

    Google Scholar 

  7. P. E. Holmes. On minimal factorizations of sporadic groups. Journal of Experimental Mathematics, 2004. To appear; at the time of writing available electronically at http://web.mat.bham.ac.uk/P.E.Holmes/minfac.dvi.

  8. K. H. Ko, S. J. Lee, J. H. Cheon, J. W. Han, J. S. Kang and C. Park. New Public-Key Cryptosystem Using Braid Groups. In M. Bellare, editor, Advances in cryptology—CRYPTO 2000, volume 1880 Lecture Notes in Computer Science, Springer (2000) pp. 166–183.

  9. W. Lempken and T. vanTrung. On Minimal Logarithmic Signatures of Finite Groups. At the time of writing available electronically at http://www.exp-math.uni-essen.de/trung/mls_submit.pdf (2004).

  10. S.S. Magliveras (2002) ArticleTitleSecret- and Public-key Cryptosystems from Group Factorizations Tatra Mountains Mathematical Publications 25 11–22 Occurrence HandleMR1976470

    MathSciNet  Google Scholar 

  11. S.S. Magliveras N.D. Memon (1992) ArticleTitleAlgebraic Properties of Cryptosystem PGM Journal of Cryptology 5 167–183

    Google Scholar 

  12. S.S. Magliveras D.R. Stinson T. Trung Particlevan (2002) ArticleTitleNew approaches to designing public key cryptosystems using one-way functions and trap-doors in finite groups Journal of Cryptology 15 285–297 Occurrence Handle10.1007/s00145-001-0018-3

    Article  Google Scholar 

  13. Paeng S.-H., Ha K.-C., Kim J.H., Chee S., Park C.(2001) New Public Key Cryptosystem Using Finite Non Abelian Groups. In: Kilian J. editor. Advances in cryptology—CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, Springer (2001) pp. 470–485.

  14. S.-H. Paeng, D. Kwon, K.-C. Ha and J. H. Kim. Improved public key cryptosystem using finite non abelian groups. Cryptology ePrint Archive: Report 2001/066, 2001. At the time of writing available electronically at http://eprint.iacr.org/2001/066/.

  15. P. Shor (1997) ArticleTitlePolynomial time algorithms for prime factorization and discrete logarithms on quantum computer SIAM Journal on Computing 26 IssueID5 1484–1509 Occurrence Handle10.1137/S0097539795293172

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to María Isabel González Vasco.

Additional information

Communicated by: P. Wild

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bohli, JM., Steinwandt, R., Vasco, M.I.G. et al. Weak Keys in MST1. Des Codes Crypt 37, 509–524 (2005). https://doi.org/10.1007/s10623-004-4040-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-004-4040-y

Keywords

AMS classification

Navigation