On the Efficiency of A General Attack against the MOBS Cryptosystem

Christopher Battarbee, Delaram Kahrobaei, Dylan Tailor, Siamak F. Shahandashti

Research output: Contribution to journalArticlepeer-review

Abstract

All instances of the semidirect key exchange protocol, a generalisation of the famous Diffie-Hellman key exchange protocol, satisfy the so-called “telescoping equality”; in some cases, this equality has been used to construct an attack. In this report we present computational evidence suggesting that an instance of the scheme called ‘MOBS (Matrices Over Bitstrings)’ is an example of a scheme where the telescoping equality has too many solutions to be a practically viable means to conduct an attack.
Original languageEnglish
Pages (from-to)289-297
Number of pages9
JournalJournal of Mathematical Cryptology
Volume16
Issue number1
DOIs
Publication statusPublished - 23 Nov 2022

Bibliographical note

© 2022 Christopher Battarbee et al.

Keywords

  • cryptanalysis
  • computational cryptanalysis
  • key exchange
  • semidirect key exchange
  • Diffie-Hellman
  • MOBS
  • Matrices over Bitstrings

Cite this