Journal of Shanghai Jiaotong University

• Automation Technique, Computer Technology • Previous Articles     Next Articles

Approaches to Resisting LengthBased Attack

CHEN Le,CAO Zhenfu   

  1. (School of Electronic, Information and Electrical Engineering, Shanghai Jiaotong University, Shanghai 200240, China)
  • Received:2009-05-20 Revised:1900-01-01 Online:2010-07-28 Published:2010-07-28

Abstract: This paper proposed the key exchange protocol based on Thompson’s group, which controls the process of generating words, and designed experiments to show that the protocol can resist the lengthbased attack. Moreover, because the lengthbased attacks on other noncommutative groups are similar to the one on Thompson’s group, it suggests that the approaches can be applied to any other noncommutative group to resist the lengthbased attack on that group.

CLC Number: