Loopholes in Two Public Key Cryptosystems Using the Modular Group

We demonstrate that the public key cryptosystems using the modular group suggested in [4,5] are vulnerable to very simple ciphertextonly attacks. Consequently, in the present form both of these systems cannot be considered as sufficiently secure for cryptographic purposes.

[1]  Akihiro Yamamura A Functional Cryptosystem Using a Group Action , 1999, ACISP.

[2]  Yvo Desmedt,et al.  Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.

[3]  Akihiro Yamamura Public-Key Cryptosystems Using the Modular Group , 1998, Public Key Cryptography.

[4]  Markus Grassl,et al.  Weaknesses in the SL2(IFs2) Hashing Scheme , 2000, CRYPTO.

[5]  John J. Cannon,et al.  The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..

[6]  Gilles Zémor,et al.  Hashing with SL_2 , 1994, CRYPTO.