Abstract
All instances of the semidirect key exchange protocol, a generalisation of the famous Diffie-Hellman key exchange protocol, satisfy the so-called “telescoping equality”; in some cases, this equality has been used to construct an attack. In this report we present computational evidence suggesting that an instance of the scheme called ‘MOBS (Matrices Over Bitstrings)’ is an example of a scheme where the telescoping equality has too many solutions to be a practically viable means to conduct an attack.
Original language | English |
---|---|
Pages (from-to) | 289-297 |
Number of pages | 9 |
Journal | Journal of Mathematical Cryptology |
Volume | 16 |
Issue number | 1 |
DOIs | |
Publication status | Published - 23 Nov 2022 |
Bibliographical note
© 2022 Christopher Battarbee et al.Keywords
- cryptanalysis
- computational cryptanalysis
- key exchange
- semidirect key exchange
- Diffie-Hellman
- MOBS
- Matrices over Bitstrings