1. Introduction
Asymmetric cryptography plays a crucial role in the modern fields of communication and information security, offering reliable solutions for safeguarding the confidentiality, integrity, and authentication of data. Widely applied in areas such as internet transmission, digital signatures, and virtual private networks (VPNs), it provides users with a secure and dependable means of communication.
Asymmetric cryptography was first presented by Diffie and Hellman in 1976. Cryptographers have designed several representative public key cryptosystems. The security of these cryptographic systems relies on the difficulty associated with solving certain conventional mathematical challenges, including the integer factorization problem (IFP) [
1], the knapsack problem (KP) [
2], the discrete logarithm problem (DLP) [
3,
4], and the shortest vector problem in lattice [
5]. The IFP and DLP are also two computational problems that public key cryptography mainly relies on. However, it is possible to solve the two problems in polynomial time using the quantum algorithm [
6] that Shor proposed. Therefore, future cryptographic systems need to resist quantum attack, and developing new cryptographic systems is currently a hot topic in cryptography research.
Tropical algebra is derived from the tropical set theory proposed by the scientist Imre Simon [
7,
8]. In tropical algebra, tropical addition involves taking the minimum or maximum value of two numbers, and tropical multiplication is the common addition. Later, some cryptography researchers combined tropical algebra with the concept of semirings and defined the algebraic structure of tropical semirings. In 2005, Kim and Roush [
9] proved that if the coefficients are finite, or all the coefficients are 0 or infinity (the Boolean case), then the univariate polynomial factorization problem of tropical semirings is usually NP-complete. In 2014, Shitov [
10] studied the tropical matrix factorization (MF) problem and proved that the k-MF problem is NP-hard when
. (The k-MF problem is as follows: given a
matrix
on
, find a
matrix
and a
matrix
, such that
).
Since tropical addition involves taking the minimum or maximum value of two numbers, tropical multiplication is the common addition and the calculations in the tropical semiring are more efficient than the classical ring. Recently, many people have attempted to propose some key exchange protocols based on tropical matrix algebra that are not only efficient but also secure, but they have been successfully attacked. By imitating some famous “classical” schemes previously proposed, Grigoriev and Shpilrain initially proposed a key exchange protocol based on tropical semirings [
11] in 2014. In this article, Grigoreiv and Shpilrain reduced the 3-SAT problem to a system of multivariate quadratic polynomial equations (MQPs) of tropical semirings and proved that the MQP of tropical semirings is NP-hard. However, when the range of tropical matrix elements contains negative numbers, it is found that each term of the tropical matrix will soon become negative and will become smaller as the number of powers increases. According to this rule, Kotov and Ushakov [
12] developed corresponding effective attack schemes. In response to this heuristic attack proposed by Kotov and Ushakov, Grigoriev and Shpilrain proposed a new improvement to the key exchange protocol. In 2019, they proposed a key exchange protocol [
13] based on the semidirect product of tropical matrices. However, this scheme was successfully broken by Rudy and Monico [
14] using a simple binary search. In addition, Isaac and Kahrobaei [
15] and Muanalifah and Sergeev [
16] have also successfully attacked the schemes. To remedy the Grigorev–Shpilrain’s protocol, Muanalifah and Sergeev proposed the use of two classes of exchange matrices (the Jones matrix and the LP matrix) from tropical algebra [
17] and utilized the bilateral action of the matrices to propose three key exchange protocols [
18]. However, in this article, the user’s secret matrix may still be represented in the linear form of the powers of the fundamental elementary matrix. Hence, its modifications are not resistant to the generalized KU attack. In 2022, Huang and Li proposed a new key exchange protocol [
19] based on the multiple exponentiation problem of matrices, using tropical algebra as a platform and the adjoint matrix of the first polynomial. The analysis results showed that the protocol can resist all known attacks. Durcheva [
20] proposed a public key encryption scheme based on the circulant matrix product problem and the two-sided action problem of matrix polynomials in 2022. Jiang et al. [
21] cracked the scheme through tropical linear equations. Ahmed et al. [
22] summarizes and analyzes the previous tropical cryptography schemes. Other cryptographic schemes based on tropical algebra can be found in the references [
23,
24,
25].
Our contribution: In this paper, we design a new class of key exchange protocol and asymmetric encryption protocol based on the tropical Jones matrix. The security of the designed key exchange protocol can be reduced to a specific type of semigroup action problem introduced by Maze in [
17], which involves the difficulty of finding the multiple exponentiation of tropical matrices. The multiple exponentiation problem can be transformed into a constructive membership problem of a semigroup in polynomial time, and this problem is a provable hard problem in the quantum computing model [
26]. In addition, this problem cannot be reduced to the DLP or the HSP (hidden subgroup problem) efficiently in most cases. So, our protocol has the property of anti-quantum computing. The greater amount of combinations of the tropical Jones matrices as opposed to standard matrix polynomials increases the difficulty of adversaries attacking the MEP. Through an analysis of the key exchange protocol, it is found that our protocol can also resist KU attack and other known attacks. Additionally, the index semiring is the non-negative integer cyclic matrix semiring, which increases key generation efficiency.
The remaining portions of this article are organized as follows.
Section 2 contains some preliminary information on tropical semirings.
Section 3 presents our protocols based on the tropical Jones matrix. In
Section 4, we provide a straightforward example to illustrate this key exchange protocol. The efficiency of the proposed cryptographic protocol, possible attacks, and parameter selection are finally covered in
Section 5. Finally,
Section 6 summarizes this article.
2. Preliminaries
Note: We represent the set and as and .
We first provide some essential information about tropical algebra. For more details, please refer to the monograph [
27].
Definition 1 ([
28] (Semiring))
. Let be a nonempty set in which two binary operations are defined, where one is an addition operation and the other is a multiplication operation, if the operation meets the following criteria:- (1)
The set R forms a commutative monoid for “
” and has an identity element denoted as
;
- (2)
The set R forms a monoid for “
” and has an identity element denoted as ;
- (3)
;
for all ;
- (4)
for all ;
- (5)
,
then
is a semiring. If for any
, satisfies
, then
is called a commutative semiring.
Definition 2 ([
29] (Tropical Semiring))
. The non-negative integer tropical commutative semiring is the set with two binary compositions and as follows: and
satisfied the following equations:
The commutative semiring properties of with addition identity and multiplication identity 0 are
easily demonstrated.
The set of all tropical polynomials over
can be defined where the unknown term is
, just like in the classical case. Let
The and operations of tropical polynomials in are like the classical addition and multiplication, with each being replaced by and each being replaced by . Proving that is a commutative semiring under and is straightforward.
Definition 3 (Tropical Matrix). Let be the set of all matrices over We define binary operations and on :
Record , then So is a semiring andare the identity elements of under and respectively. It is rare for tropical matrices to be reversible, unlike the classical situation. Only tropical matrices obtained by elementary row or column transformations of diagonal matrices can be reversed.
Similarly, we can define a tropical matrix polynomial as follows:
where
(
n times).
is a commutative subsemiring of
with respect to tropical matrix addition and multiplication.
Definition 4 ([
23] (Circulant Matrix))
. If matrix
is in the following form:it is called a circulant matrix, where the terms are . The set of all non-negative integer circulant matrices is denoted as . 2.1. Jones Matrix
In this section, we describe a specific type of matrices that were considered by Jones [
30], and, by extending the polynomial concept, we can derive the concept of quasi-polynomials for Jones matrices, which will be applied to the protocol in
Section 3.
Definition 5 ([
18] (Jones Matrix))
. Let be an n × n tropical matrix that satisfies the following property:we call a Jones matrix. Definition 6 ([
18] (Deformation))
. Let be a Jones matrix and . The matrix defined byis called a deformation of . Next, we will describe two theorems for a Jones matrix.
Theorem 1 ([
18])
. If is a Jones matrix, then is also a Jones matrix for any . Theorem 2 ([
18])
. Let be a Jones matrix, thenfor any and , such that and . According to the above theorems, we define a quasi-polynomial and replace a monomial with a deformation.
Definition 7 ([
18] (Quasi-polynomial))
. Let be a Jones matrix. Matrix is termed a quasi-polynomial of iffor some finite subset of rational numbers in and for . The set composed of all quasi-polynomials of is denoted as .
2.2. A New Semigroup Action
Let
A be a non-negative integer circulant matrix,
be a Jones matrix, and
. Now consider the action of the multiplicative semigroup
on the Cartesian product
, as shown below:
where
(
times). It can be easily proven that
is a semigroup action of
on
.
2.3. Multiple Exponentiation Problem of Tropical Matrices
According to Reference [
19], we can give the definition of the ME problem of the tropical Jones matrix.
Definition 8 (ME problem). Let , be a Jones matrix, and , and assuming , where . The multiple exponentiation problem of tropical matrices is to find a matrix satisfying the above equation for given and . (Remember that is unknown.) We refer to the issue as the “ME problem” for simplicity’s sake.
Many results in traditional algebra are known to be invalid in tropical algebra. Consequently, certain properties of ordinary matrices, such as Cayley–Hamilton theorem, eigenvalues, and determinant, do not apply. But if satisfies certain conditions, we can simplify the problem to the DLP.
Proposition 1 ([
18])
. If a component of exists such that then the ME problem can be simplified to the DLP in polynomial time. 3. Key Exchange Protocol and Encryption Protocol Based on the Jones Matrix
This section presents a key exchange protocol that is similar to the Diffie–Hellman protocol. It is based on the multiple exponentiation problem of tropical matrices and a public key encryption protocol such as the ELGamal encryption protocol.
3.1. A New Key Exchange Protocol
Let be such that no component of exists such that . The protocol’s public parameters are .
Protocol A
- (1)
Alice randomly selects a circulant matrix , calculates , and sends to Bob;
- (2)
Bob randomly selects a circulant matrix , calculates , and sends to Alice;
- (3)
- (4)
Note that “” is the matrix multiplication in .
Given that is commutative, we obtain and . Thus, Bob and Alice have a shared secret key.
3.2. A Common Key Encryption Protocol Based on the Jones Matrix
Protocol B
- (1)
Key Generation
Let
. No component
of
exists such that
. The protocol’s public parameters are
. The key generation center randomly chooses a circulant matrix
in
, and computes
Alice’s public key is shown as . Alice’s secret key is .
- (2)
Encryption
Bob needs to do the following calculation to send the plaintext message to Alice.
- ①
Bob randomly selects a circulant matrix , then computes , and takes it as the first part of the ciphertext.
- ②
Bob calculates as the final component of the ciphertext. Note that the “ ” here is an ordinary matrix addition operation.
- ③
Bob sends ciphertext just calculated to Alice.
- (3)
Decryption
After receiving the ciphertext sent by Bob, Alice decrypts it with her private key.
- ①
Alice first computes .
- ②
Alice then computes to get the original plaintext message. Note that “” here is an ordinary matrix subtraction operation.
5. Security Analysis and Parameter Selection
In this section, we analyze the security of the proposed key exchange protocol. The analysis shows that our protocol can resist all known attacks and has the property of anti-quantum computing. First, we prove that Protocol B is semantically secure.
Definition 9 ([
19])
. Suppose and , where . Let . The decisional ME problem is to decide whether , given , , , and . To simplify, we denote it as the “DME”. Theorem 3. An algorithm capable of resolving the DME problem can effectively ascertain the legitimacy of ciphertexts within Protocol B. Conversely, an algorithm designed to determine the validity of ciphertexts within Protocol B can be harnessed to address the DME problem.
Proof. Let us initially assume that algorithm
possesses the capability to determine the correctness of a decryption within Protocol B. When given the inputs
,
,
, and
, the algorithm
outputs “yes” if
is the decryption of
and outputs “no” otherwise. Given the input
,
,
, and
, the algorithm
outputs “yes” if
is the decryption of
and “no” otherwise. Now, we use
to solve the DME problem. Suppose we are given
,
,
, and
, and our aim is to determine whether
. Let
and
, where
is the
zero matrix of
. Input all of these parameters into
. Note that
is now the secret key. The decryption of
is
Consequently, outputs “yes” precisely when equals , specifically when . This resolution effectively addresses the decision DME problem.
On the contrary, let us assume an algorithm can effectively tackle the DME problem. This implies that if provided with inputs , , , and , the algorithm produces “yes” if and “no” otherwise. Let it be the claimed decryption of the ciphertext. Consider as the asserted decryption of the ciphertext . Input as . It is worth noting that represents the accurate plaintext for the ciphertext only if , which occurs if and only if . Hence, is the accurate plaintext if and only if . Therefore, given these inputs, yields “yes” precisely when is the accurate plaintext.
The Theorem is proved. □
5.1. Possible Attacks
- (1)
Brute-force attack. Assuming is a circulant matrix with terms . The attacker clearly has options from which to select , so the parameters and must satisfy .
- (2)
Tropical matrix decomposition attack. Tropical matrix decomposition attack involves a search for a circulant matrix such that and , then the attacker can find the shared key. However, the attacker needs to factor into the form of , where is NP-hard, so the tropical matrix decomposition attack is not effective.
- (3)
KU attack. Since the Jones matrix is unknown, if we want to find
N, the system of equations needs to be solved as follows:
Solving the above system of equations is NP-hard. Therefore, the KU attack is ineffective.
Assuming the attacker knows the matrix N, finding the private key A from the public key is what they must accomplish. KU attacks are limited to breaking down tropical matrices into their product, like . In this protocol, the KU attack will not function if the component value is more than two. Therefore, we require that the components of be greater than or equal to three.
- (4)
Generalized KU attack. Additionally, a common matrix can be broken down by the generalized KU attack into the linear equivalent of the tropical basic elementary matrix: the product of two Jones matrices. However, in our cryptosystems, if , then each component matrix of is the result of multiplying by more than two matrices. In this instance, our cryptosystems are likewise unaffected by the generalized KU attack.
- (5)
RM attack. Grigoriev and Shpilrain designed another key exchange protocol based on the action of the semidirect product. However, in this key exchange protocol, the addition operation of the tropical matrix is used, and the addition of the tropical matrix has the property of idempotent, so the power of this part of the semidirect product is partially order-preserving. Rudy and Monico used this feature to create a straightforward binary search algorithm that allowed them to break the cryptosystem in [
14]. There is no tropical matrix addition operation in
in our cryptosystems. Thus, our cryptosystems can also resist this attack.
- (6)
Quantum attack. Andrew et al. [
26] proved that the constructive membership problem of the semigroup is a provable hard quantum computation model, and the lower bound of its quantum computation complexity is exponential. Since the ME problem can be transformed into a semigroup constructive member problem, our cryptosystems have the property of anti-quantum computing.
Table 1 provides the comparison of our protocols with other relevant schemes in terms of resisting various known attacks.
5.2. Parameter Selection and Efficiency
Nachtigall et al. defined a sequence of matrices to be almost linear periodic in [
31]. In the following definition, if the matrix
, then
denotes the
element of
.
Definition 10 ([
31] (Almost linear periodic))
. If there is a period , linear factor , and some defect such that the following equation applies for all indices and all , then a sequence of matrices is almost linearly periodic: In [
32], Beccelli et al. demonstrated that the higher powers sequence of tropical matrices is almost linear periodic. In our protocol, if the exponent
and period
of the Jones matrix
are small, there is a possibility of potential heuristic attacks. The exponent
of the tropical matrix increases with the increase of the order
of the matrix. We have shown through experiments that it is feasible to generate a Jones matrix
and
with an exponent exceeding
and using this feature to attack does not work.
From Proposition 1, we know that if there exists a component of such that , then the ME problem can be simplified to the DLP in polynomial time. To avoid this situation, must satisfy that there is no component of such that .
In Protocol A and B, we recommend using the following parameters:
- (1)
The order of the Jones matrix is and the element selection in ;
- (2)
Because the deformation of the Jones matrix means that the terms of the matrix may contain fractions, we recommend , where exponent is selected rational numbers in ;
- (3)
Because the terms of the private key matrices and are exponents of , the terms of the circulant matrices and cannot be too large. Here, we recommend selecting their terms in .
Now, we analyze the computational efficiency of encryption Protocol B. The most time-consuming operations in the protocol are the matrix exponentiations , , , and . (In the key generation process, is randomly generated, and the private key matrix is randomly selected from cyclic matrices, compared to matrix exponentiation operations, so their time consumption can be neglected. In the encryption and decryption processes, the computation time for the ordinary matrix addition and subtraction is also typically very fast and can be neglected compared to matrix exponentiation.)
Table 2 compares the execution time of the operation
with various parameters, and
Table 3 compares the execution time of the key generation, encryption, and decryption processes under different parameters (research platform: AMD Ryzen 7 6800H with Radeon Graphics3.20 GHz).
Similar to the scheme in reference [
19], our protocol is also built upon employing the tropical matrix multiple exponentiation problem. However, we employ the tropical Jones matrix MEP instead of the matrix polynomial MEP. Specifically, the base semiring we use is
, not
. Under the same parameters, the quasi-polynomial set of Jones matrices is much larger than the general matrix polynomial set, greatly increasing the adversary’s search space. Additionally, since our index semiring is
rather than
in the key generation process, we only need to randomly generate a cyclic matrix without calculating the matrix polynomials, which makes the key generation efficiency higher in our protocol.
Table 4 compares our protocol with the protocol in reference [
19].