Approaches to resisting length-based attack

  • Le Chen
  • , Zhen Fu Cao*
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

This paper proposed the key exchange protocol based on Thompson's group, which controls the process of generating words, and designed experiments to show that the protocol can resist the length-based attack. Moreover, because the length-based attacks on other non-commutative groups are similar to the one on Thompson's group, it suggests that the approaches can be applied to any other non-commutative group to resist the length-based attack on that group.

Original languageEnglish
Pages (from-to)968-974
Number of pages7
JournalShanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University
Volume44
Issue number7
StatePublished - Jul 2010
Externally publishedYes

Keywords

  • Key exchange protocol
  • Length-based attack
  • Thompson's group

Fingerprint

Dive into the research topics of 'Approaches to resisting length-based attack'. Together they form a unique fingerprint.

Cite this