You are here: DASMOD > PublicationDetail


Start of topic | Skip to actions

Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security

In: Preprint. Available online: http://eprint.iacr.org/2008/514, 2007

Authors

  • T. Rai
  • Stanislav Bulygin

Abstract

In this paper we consider chosen-ciphertext attacks against noncommutative Polly Cracker-type cryptosystems. We present several versions of these attacks, as well as techniques to counter them. First we introduce a chosen-ciphertext attack, which assumes a very simple private key. We then present generalizations of this attack which are valid in more general situations, and propose a simple but effective technique to counter these attacks. Finally, we show how this technique can also be used to counter the adaptive chosen-ciphertext attacks against noncommutative Polly Cracker-type cryptosystems.

BibTeX

 
@Article{ Rai.Bulygin07noncommutative,
title = { Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security },
author = { T. Rai and Stanislav Bulygin },
journal = { Preprint },
note = { Available online: http://eprint.iacr.org/2008/514 },
year = 2007,
}


This publication belongs to the project KryFoVe.

r16 - 11 Jul 2007 - TheoHaerder

Copyright © University of Kaiserslautern, 2009. All material on this website is the property of the respective authors.
Questions or comments? Contact DASMOD webmaster.