Abstract
The public key cryptosystem MST1 has been introduced by Magliveras et al. [12] (Public Key Cryptosystems from Group Factorizations. Jatra Mountain Mathematical Publications). Its security relies on the hardness of factoring with respect to wild logarithmic signatures. To identify ‘wild-like’ logarithmic signatures, the criterion of being totally-non-transversal has been proposed. We present tame totally-non-transversal logarithmic signatures for the alternating and symmetric groups of degree ≥ 5. Hence, basing a key generation procedure on the assumption that totally-non-transversal logarithmic signatures are ‘wild like’ seems critical. We also discuss the problem of recognizing ‘weak’ totally-non-transversal logarithmic signatures, and demonstrate that another proposed key generation procedure based on permutably transversal logarithmic signatures may produce weak keys.
Similar content being viewed by others
References
W. Bosma J. Cannon C. Playoust (1997) ArticleTitleThe Magma Algebra System I: The User Language Journal of Symbolic Computation 24 235–265 Occurrence Handle10.1006/jsco.1996.0125 Occurrence HandleMR1484478
C. A. Cusack Group Factorizations in Cryptography. PhD thesis, University of Nebraska (2000).
M.I.G. Vasco R. Steinwandt (2002) ArticleTitleObstacles in two public-key cryptosystems based on group factorizations Tatra Mountains Mathematical Publications 25 23–37
The GAP Team. GAP—Groups, Algorithms and Programming. Lehrstuhl D für Mathematik, RWTH Aachen, Germany and School of Mathematical and Computational Sciences, Univ. St. Andrews, Scotland (1997).
M.I.González Vasco C. Martínez R. Steinwandt (2004) ArticleTitleTowards a uniform description of several group based cryptographic primitives Designs, Codes and Cryptography 33 215–226
M.I. González Vasco M. Rötteler R. Steinwandt (2003) ArticleTitleOn minimal length factorizations of finite groups. Experimental Mathematics 12 IssueID1 1–12
P. E. Holmes. On minimal factorizations of sporadic groups. Journal of Experimental Mathematics, 2004. To appear; at the time of writing available electronically at http://web.mat.bham.ac.uk/P.E.Holmes/minfac.dvi.
K. H. Ko, S. J. Lee, J. H. Cheon, J. W. Han, J. S. Kang and C. Park. New Public-Key Cryptosystem Using Braid Groups. In M. Bellare, editor, Advances in cryptology—CRYPTO 2000, volume 1880 Lecture Notes in Computer Science, Springer (2000) pp. 166–183.
W. Lempken and T. vanTrung. On Minimal Logarithmic Signatures of Finite Groups. At the time of writing available electronically at http://www.exp-math.uni-essen.de/∼trung/mls_submit.pdf (2004).
S.S. Magliveras (2002) ArticleTitleSecret- and Public-key Cryptosystems from Group Factorizations Tatra Mountains Mathematical Publications 25 11–22 Occurrence HandleMR1976470
S.S. Magliveras N.D. Memon (1992) ArticleTitleAlgebraic Properties of Cryptosystem PGM Journal of Cryptology 5 167–183
S.S. Magliveras D.R. Stinson T. Trung Particlevan (2002) ArticleTitleNew approaches to designing public key cryptosystems using one-way functions and trap-doors in finite groups Journal of Cryptology 15 285–297 Occurrence Handle10.1007/s00145-001-0018-3
Paeng S.-H., Ha K.-C., Kim J.H., Chee S., Park C.(2001) New Public Key Cryptosystem Using Finite Non Abelian Groups. In: Kilian J. editor. Advances in cryptology—CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, Springer (2001) pp. 470–485.
S.-H. Paeng, D. Kwon, K.-C. Ha and J. H. Kim. Improved public key cryptosystem using finite non abelian groups. Cryptology ePrint Archive: Report 2001/066, 2001. At the time of writing available electronically at http://eprint.iacr.org/2001/066/.
P. Shor (1997) ArticleTitlePolynomial time algorithms for prime factorization and discrete logarithms on quantum computer SIAM Journal on Computing 26 IssueID5 1484–1509 Occurrence Handle10.1137/S0097539795293172
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by: P. Wild
Rights and permissions
About this article
Cite this article
Bohli, JM., Steinwandt, R., Vasco, M.I.G. et al. Weak Keys in MST1. Des Codes Crypt 37, 509–524 (2005). https://doi.org/10.1007/s10623-004-4040-y
Received:
Revised:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/s10623-004-4040-y
Keywords
- public key cryptography
- cryptanalysis
- group factorizations
- logarithmic signatures
- finite permutation groups