Abstract

Abstract We investigate security properties of the Anshel–Anshel–Goldfeld commutator key-establishment protocol [Math. Res. Lett. 6 (1999), 287–291] used with certain polycyclic groups described by Eick and Kahrobaei [http://arxiv.org/abs/math.GR/0411077]. We show that despite low success of the length based attack shown by Garber, Kahrobaei and Lam [J. Math. Crypt. 9 (2015), 33–43] the protocol can be broken by a deterministic polynomial-time algorithm.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call