Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem

This paper revisits a public key cryptosystem which is based on finite string-rewriting systems. We consider a new approach for cryptanalysis of such proposals—the so-called completion attack. If a particular kind of weak key is generated, then a passive adversary is able to retrieve secret messages with a significant probability. Our idea can be applied to other rewriting based cryptosystems as well. Finally we discuss issues concerning the practical usage and present some experimental results. The described vulnerabilities lead to the conclusion that at least the key generation of Oleshchuk’s cryptosystem has to be revised.

[1]  H. Brown,et al.  Computational Problems in Abstract Algebra , 1971 .

[2]  Rani Siromoney,et al.  A Public Key Cryptosystem Based on Lyndon Words , 1990, Inf. Process. Lett..

[3]  Friedrich Otto,et al.  Finite complete rewriting systems and the complexity of the word problem , 1984, Acta Informatica.

[4]  J. Van Leeuwen,et al.  Handbook of theoretical computer science - Part A: Algorithms and complexity; Part B: Formal models and semantics , 1990 .

[5]  Colm Ó'Dúnlaing Undecidable questions related to Church-Rosser Thue systems , 1983, Theor. Comput. Sci..

[6]  Akihiro Yamamura Public-Key Cryptosystems Using the Modular Group , 1998, Public Key Cryptography.

[7]  Ronald V. Book,et al.  Confluent and Other Types of Thue Systems , 1982, JACM.

[8]  Neal R. Wagner,et al.  A Public Key Cryptosystem Based on the Word Problem , 1985, CRYPTO.

[9]  Colin Boyd,et al.  Cryptography and Coding , 1995, Lecture Notes in Computer Science.

[10]  Maria Isabel Gonzalez Vasco,et al.  Attacking a public key cryptosystem based on tree replacement , 2007, Discret. Appl. Math..

[11]  K. G. Subramanian,et al.  Tree Replacement and Public Key Cryptosystem , 2002, INDOCRYPT.

[12]  D. Knuth,et al.  Simple Word Problems in Universal Algebras , 1983 .

[13]  Paliath Narendran,et al.  Church-Rosser Thue systems and formal languages , 1988, JACM.

[14]  Valtteri Niemi Cryptology: Language-Theoretic Aspects , 1997, Handbook of Formal Languages.

[15]  Alfred Menezes,et al.  Progress in Cryptology — INDOCRYPT 2002 , 2002, Lecture Notes in Computer Science.

[16]  Vladimir A. Oleshchuk,et al.  On Public-Key Cryptosystem Based on Church-Rosser String-Rewriting Systems (Extended Abstract) , 1995, COCOON.

[17]  Grzegorz Rozenberg,et al.  Handbook of Formal Languages , 1997, Springer Berlin Heidelberg.

[18]  Arto Salomaa,et al.  Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.

[19]  Jean-Pierre Jouannaud,et al.  Rewrite Systems , 1991, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics.

[20]  Paliath Narendran,et al.  An O(|T|3) Algorithm for Testing the Church-Rosser Property of Thue Systems , 1985, Theor. Comput. Sci..

[21]  Robert B. Fisher Proceedings of the 5th IMA Conference on the Mathematics of Surfaces, Edinburgh, UK, September 14-16, 1992 , 1994, IMA Conference on the Mathematics of Surfaces.

[22]  Rainer Steinwandt,et al.  Pitfalls in public key cryptosystems based on free partially commutative monoids and groups , 2006, Appl. Math. Lett..

[23]  Friedrich Otto,et al.  String-Rewriting Systems , 1993, Text and Monographs in Computer Science.

[24]  Vladimir A. Oleshchuk Church-Rosser Codes , 1995, IMACC.

[25]  Jean H. Gallier,et al.  Reductions in Tree Replacement Systems , 1985, Theor. Comput. Sci..

[26]  Arto Salomaa A public-key cryptosystem based on language theory , 1988, Comput. Secur..

[27]  Yuri V. Matiyasevich,et al.  Decision problems for semi-Thue systems with a few rules , 2005, Theor. Comput. Sci..