Sciweavers

INDOCRYPT
2005
Springer

Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem

14 years 5 months ago
Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem
This paper revisits a public key cryptosystem which is based on finite string-rewriting systems. We consider a new approach for cryptanalysis of such proposals—the so-called completion attack. If a particular kind of weak key is generated, then a passive adversary is able to retrieve secret messages with a significant probability. Our idea can be applied to other rewriting based cryptosystems as well. Finally we discuss issues concerning the practical usage and present some experimental results. The described vulnerabilities lead to the conclusion that at least the key generation of Oleshchuk’s cryptosystem has to be revised.
Heiko Stamer
Added 27 Jun 2010
Updated 27 Jun 2010
Type Conference
Year 2005
Where INDOCRYPT
Authors Heiko Stamer
Comments (0)