<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf24204</article-id><article-id pub-id-type="doi">10.15388/Informatica.2013.393</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>Cryptanalysis of a Public Key Cryptosystem Based on the Matrix Combinatorial Problem</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Lee</surname><given-names>Moon Sung</given-names></name><email xlink:href="mailto:moolee@snu.ac.kr">moolee@snu.ac.kr</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><aff id="j_INFORMATICA_aff_000">Department of Mathematical Sciences, Seoul National University, Seoul, 151-747, Korea</aff></contrib-group><pub-date pub-type="epub"><day>01</day><month>01</month><year>2013</year></pub-date><volume>24</volume><issue>2</issue><fpage>219</fpage><lpage>230</lpage><history><date date-type="received"><day>01</day><month>03</month><year>2011</year></date><date date-type="accepted"><day>01</day><month>06</month><year>2012</year></date></history><abstract><p>In this paper, we present a cryptanalysis of a public key cryptosystem based on the matrix combinatorial problem proposed by Wang and Hu (2010). Using lattice-based methods finding small integer solutions of modular linear equations, we recover the secret key of this cryptosystem for a certain range of parameters. In experiments, for the suggested parameters by Wang and Hu, the secret key can be recovered in seconds.</p></abstract><kwd-group><label>Keywords</label><kwd>public key cryptosystem</kwd><kwd>matrix combinatorial problem</kwd><kwd>lattice</kwd><kwd>modular linear equation</kwd></kwd-group></article-meta></front></article>