Public-Key Cryptography Based on Tropical Circular Matrices
Abstract
:1. Introduction
2. Tropical Matrix Semiring over Integer
- (1)
- is a commutative semigroup with an identity element 0;
- (2)
- is a semigroup with an identity element ;
- (3)
- Multiplication satisfies the left and right distribution law for addition;
- (4)
- .
3. Public-Key Cryptography Using Tropical T-Circular Matrices
3.1. Key Exchange Protocol Based on Tropical Circular Matrices
- (1)
- Alice selects at random two matricesand, and computes. In addition, she sends to Bob the matrix.
- (2)
- Bob selects at random two matricesand, and computes. He sends to Alice the vector.
- (3)
- Alice computes. In addition, Bob computes.
3.2. Public-Key Encryption Scheme Based on Tropical Circular Matrices
- Cryptosystem 1.
- (1)
- Key generation:Let be three positive integers. Let , and . Suppose that . are public. Alice’s public key is . Alice’s secret key is .
- (2)
- Encryption:Bob wants to send a message to Alice.
- (i)
- Bob chooses at random , and computes as a part of the ciphertext.
- (ii)
- Bob computes as the rest of the ciphertext, where “+” is the ordinary integer matrix addition.
- (iii)
- Bob sends the ciphertext to Alice.
- (3)
- Decryption:Alice receives the ciphertext and tries to decrypt it.
- (i)
- Using her secret key , Alice computes .
- (ii)
- Alice computes , where “” is the ordinary integer matrix subtraction.
SinceAlice obtains the plaintext messages .
4. Security and Parameter Selection
4.1. KU Attack
Algorithm 1: KU Attack algorithm |
Input: , .
Output: , such that , where , . (1) Compute and ; (2) Among all minimal covers of by , that is, all minimal subsets such that find a cover for which the system is solvable. |
4.2. RM Attacks
Algorithm 2: RM Attack algorithm |
Input: , where , for some positive integer m (). Output: m. (1) Let and ; (2) Execute the following loop when . (i) (ii) Compute . If , ; If , ; If , output . |
4.3. Parameter Selection
5. Conclusions and Further Research
- (1)
- A possible algorithm for solving TCMAP. If we can find some algorithms for solving the systems of min-plus polynomial equations, then they can be used to attack our schemes.
- (2)
- Other cryptographic applications of TCMAP. For example, we can try to design digital signature schemes and identity authentication schemes based on TCMAP.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Notations
set of integers; | |
tropical semiring of integers ; | |
set of all tropical matrices over ; | |
set of all tropical upper -circular matrices over ; | |
TCMAP | two-side tropical circular matrix action problem; |
CTCMAP | computational two-side tropical circular matrix action problem; |
DTCMAP | decisional two-side tropical circular matrix action problem. |
Appendix A. An Example of Protocol 1 with Small Parameters
- (1)
- Alice selects at random two t-circular matrices as follows:
- (2)
- Bob selects at random two t-circular matrices as follows:
- (3)
- Alice computes . Bob computes .
Appendix B. An Example of Solving TMCAP with Small Parameters
References
- Diffie, W.D.; Hellman, E. New directions in cryptography. IEEE Trans. Inf. Theory 1976, 22, 644–654. [Google Scholar] [CrossRef] [Green Version]
- Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
- ElGamal, T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 1985, 31, 469–472. [Google Scholar] [CrossRef]
- Shor, P. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 1997, 26, 1484–1509. [Google Scholar] [CrossRef] [Green Version]
- Bernstein, D.J.; Lange, T. Post-quantum cryptography. Nature 2017, 549, 188–194. [Google Scholar] [CrossRef] [PubMed]
- Baumslag, G.; Fine, B.; Xu, X. Cryptosystems using linear groups. Appl. Algebra Eng. Commun. Comput. 2006, 17, 205–217. [Google Scholar] [CrossRef]
- Kahrobaei, D.; Koupparis, C.; Shpilrain, V. Public key exchange using matrices over group rings. Groups-Complex. Cryptol. 2013, 5, 97–115. [Google Scholar] [CrossRef] [Green Version]
- Rososhek, S.K. New practical algebraic public-key cryptosystem and some related algebraic and computational aspects. Appl. Math. 2013, 4, 1043–1049. [Google Scholar] [CrossRef] [Green Version]
- Rososhek, S.K. Modified matrix modular cryptosystems. Br. J. Math. Comput. Sci. 2015, 5, 613–636. [Google Scholar] [CrossRef]
- Anshel, I.; Anshel, M.; Goldfeld, D. An algebraic method for public-key cryptography. Math. Res. Lett. 1999, 6, 287–291. [Google Scholar] [CrossRef]
- Garber, D. Braid group cryptography. In Braids: Introductory Lectures on Braids, Configurations and Their Applications; World Scientific: Singapore, 2010; pp. 329–403. [Google Scholar]
- Paeng, S.H.; Ha, K.C.; Kim, J.H.; Chee, S.; Park, C. New public key cryptosystem using finite non Abelian groups. In Proceedings of the 21st Annual International Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 470–485. [Google Scholar]
- Hoffstein, J.; Pipher, J.; Silverman, J.H. NTRU: A ring-based public key cryptosystem. In Proceedings of the International Algorithmic Number Theory Symposium, Portland, OR, USA, 21–25 June 1998; Springer: Berlin/Heidelberg, Germany, 1998; pp. 267–288. [Google Scholar]
- Eftekhari, M. Cryptanalysis of some protocols using matrices over group rings. In Proceedings of the 9th International Conference on Cryptology in Africa, Dakar, Senegal, 24–26 May 2017; Springer: Cham, Switzerland, 2017; pp. 223–229. [Google Scholar]
- Steinwandt, R. Loopholes in two public key cryptosystems using the modular group. In Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, 13–15 February 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 180–189. [Google Scholar]
- Hofheinz, D.; Steinwandt, R. A practical attack on some braid group based cryptographic primitives. In Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, 6–8 January 2003; Springer: Berlin/Heidelberg, Germany, 2003; pp. 187–198. [Google Scholar]
- Gentry, C.; Szydlo, M. Cryptanalysis of the revised NTRU signature scheme. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, 28 April–2 May 2002; Springer: Berlin/Heidelberg, Germany, 2002; pp. 299–320. [Google Scholar]
- Maze, G.; Monico, C.; Rosenthal, J. Public Key Cryptography based on semigroup Actions. Adv. Math. Commun. 2007, 1, 489–507. [Google Scholar] [CrossRef] [Green Version]
- Maze, G.; Monico, C.; Rosenthal, J. A Public Key Cryptosystem Based on Actions by Semigroups. In Proceedings of the IEEE International Symposium on Information Theory, Lausanne, Switzerland, 30 June–5 July 2002; pp. 266–289. [Google Scholar]
- Steinwandt, R.; Corona, A. Cryptanalysis of a 2-party key establishment based on a semigroup action problem. Adv. Math. Commun. 2011, 5, 87–92. [Google Scholar] [CrossRef]
- Atani, R.E. Public Key Cryptography Based on Semimodules over Quotient Semirings. Int. Math. Forum 2007, 2, 2561–2570. [Google Scholar] [CrossRef] [Green Version]
- Durcheva, M. Public Key Cryptosystem Based on Two Sided Action of Different Exotic Semirings. J. Math Syst. Sci. 2014, 4, 6–13. [Google Scholar]
- Durcheva, M. Semirings as Building Blocks in Cryptography; Cambridge Scholars Publishing: Newcastle upon Tyne, UK, 2020. [Google Scholar]
- Grigoriev, D.; Shpilrain, V. Tropical cryptography. Commun. Algebra 2014, 42, 2624–2632. [Google Scholar] [CrossRef]
- Kotov, M.; Ushakov, A. Analysis of a key exchange protocol based on tropical matrix algebra. J. Math. Cryptol. 2018, 12, 137–141. [Google Scholar] [CrossRef]
- Grigoriev, D.; Shpilrain, V. Tropical cryptography II-Extensions by homomorphisms. Commun. Algebra 2019, 47, 4224–4229. [Google Scholar] [CrossRef]
- Rudy, D.; Monico, C. Remarks on a Tropical Key Exchange System. J. Math. Cryptol. 2021, 15, 280–283. [Google Scholar] [CrossRef]
- Isaac, S.; Kahrobaei, D. A closer look at the tropical cryptography. Int. J. Comput. Math. Comput. Syst. Theory 2021, 6, 137–142. [Google Scholar] [CrossRef]
- Ahmed, K.; Pal, S.; Mohan, R. A review of the tropical approach in cryptography. Cryptologia 2021, 1–25. [Google Scholar] [CrossRef]
- Vandiver, H. Note on a simple type of algebra in which the cancellation law of addition does not hold. Bull. Am. Math. Soc. 1934, 40, 914–920. [Google Scholar] [CrossRef] [Green Version]
- Speyer, D.; Sturmfels, B. Tropical mathematics. Math. Mag. 2009, 82, 163–173. [Google Scholar] [CrossRef]
- Gupta, V.; Chaudhari, J.N. Monic ideals in a groupsemiring. Asian-Eur. J. Math. 2011, 4, 445–450. [Google Scholar] [CrossRef]
- Litvinov, G.L.; Rodionov, A.Y.; Sergeev, S.N.; Sobolevski, A.N. Universal algorithms for solving the matrix Bellman equations over semirings. Soft Comput. 2013, 17, 1767–1785. [Google Scholar] [CrossRef] [Green Version]
Schemes | Mathematical Problems | KU Attack | RM Attack |
---|---|---|---|
Grigoriev et al. [24] | Two-side matrix action problem | × | √ |
Grigoriev et al. [26] | Semidirect product problem | √ | × |
Our scheme | Two-side tropical circular matrix action problem | √ | √ |
k | Size of sk (kB) | Size of pk (kB) | Complexity of Solving TCMAP |
---|---|---|---|
10 | 0.0781 | 0.7813 | |
20 | 0.1563 | 3.1250 | |
30 | 0.2344 | 7.0313 | |
40 | 0.3125 | 12.5000 | |
50 | 0.3906 | 19.5313 | |
60 | 0.4688 | 28.1250 |
Experimental Platform | Key Generation | Encryption | Decryption |
---|---|---|---|
Intel (R) i7-8550 1.80 GHz | 0.984 s | 1.018 s | 0.513 s |
Intel (R) i5-5200 2.20GHz | 0.624 s | 0.594 s | 0.297 s |
Intel (R) i7-4700 2.40GHz | 0.363 s | 0.346 s | 0.187 s |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Huang, H.; Li, C.; Deng, L. Public-Key Cryptography Based on Tropical Circular Matrices. Appl. Sci. 2022, 12, 7401. https://doi.org/10.3390/app12157401
Huang H, Li C, Deng L. Public-Key Cryptography Based on Tropical Circular Matrices. Applied Sciences. 2022; 12(15):7401. https://doi.org/10.3390/app12157401
Chicago/Turabian StyleHuang, Huawei, Chunhua Li, and Lunzhi Deng. 2022. "Public-Key Cryptography Based on Tropical Circular Matrices" Applied Sciences 12, no. 15: 7401. https://doi.org/10.3390/app12157401
APA StyleHuang, H., Li, C., & Deng, L. (2022). Public-Key Cryptography Based on Tropical Circular Matrices. Applied Sciences, 12(15), 7401. https://doi.org/10.3390/app12157401