2000 character limit reached
Linear decomposition attack on public key exchange protocols using semidirect products of (semi)groups (1501.01152v1)
Published 6 Jan 2015 in cs.CR and math.GR
Abstract: We show that a linear decomposition attack based on the decomposition method introduced by the author works by finding the exchanged secret keys in all main protocols using semidirect products of (semi)grops proposed by Kahrobaei, Shpilrain, Habeeb, Koupparis and Lam.