Submitted:
01 April 2024
Posted:
02 April 2024
You are already at the latest version
Abstract
Keywords:Â
1. Introduction and Motivation
- 1.
- We introduce two key exchange protocols that exploit the commutative properties of tropical block matrices, thereby simplifying the key exchange process while enhancing security.
- 2.
- A thorough analysis is presented, demonstrating the reduced operational overhead compared to existing block matrix schemes. This includes comparative evaluations showing lower computational complexity while maintaining equivalent key sizes.
- 3.
- We anchor our security claims in the inherent difficulty of matrix decomposition within tropical semirings, a challenge that poses significant barriers to conventional attack methodologies.
- 4.
- The paper also includes illustrative examples and comparative analyses to underscore the tangible efficiency gains our protocols offer.
2. Preliminaries
- forms a commutative monoid with identity element 0.
- forms a monoid with identity element 1.
- â distributes over â.
- For all , .
- Addition is the element-wise operation .
- Multiplication is performed using the standard matrix multiplication rules applied with â.
- Scalar multiplication scales each matrix element by x to obtain .
2.1. Exponentiation of Block Matrices
2.2. Tropical Semirings
2.3. Commutative Matrices in Tropical Semirings
3. Block Matrix Key Exchange Protocols
3.1. The original protocol
- 1.
- Alice chooses as her private keys: one positive integer l and a matrix . She transmits the set of matrices commuting with A.
- 2.
- Bob chooses as his private keys: one positive integer k and a matrix . He transmits the set of matrices commuting with Y.
- 3.
- Alice chooses her second private key: a matrix . She calculates:and sends to Bob.
- 4.
- Bob chooses his second private key: a matrix . He calculates:and sends to Alice.
- 5.
- Alice computes the common private key:
- 6.
- Bob computes the common private key:
- 1.
- Alice selects matrices A and B, and Bob selects matrices C and D with the property that A and C commute; B and D also commute. This means that A and C belong to the same set of commuting matrices, B and D belong to the same set of commuting matrices. Alice and Bob agree on a matrix T. The secret keys of the users are positive integers a and b, respectively,
- 2.
-
Alice computeswhereShe sends her public key to Bob.
- 3.
-
Bob computes:whereHe sends his public key to Alice.
- 4.
- Alice computes the common key:
- 5.
- Bob computes the common key:
3.2. Proposed Solution
3.3. Protocol Steps
- 1.
- Both parties agree on a common matrix T.
- 2.
- Alice opts for matrices A and B, while Bob picks matrices C and D. They ensure that A commutes with C and B with D.
- 3.
- Alice calculates . Her public key is set as .
- 4.
- Bob, in a parallel manner, computes . He sets his public key as .
- 5.
- They then exchange their public keys.
- 6.
- Using Bobâs public key and her private matrices, Alice computes the shared key, .
- 7.
- Similarly, using Aliceâs public key and his private matrices, Bob computes the shared key, .
- 8.
- Due to the inherent commutative properties, both parties find that .
3.4. Implementation one - Tropical Block Matrix KEP using Polynomials of Matrices
- 1.
-
Alice selects as her secret key two tropical polynomials and , and a positive integer a. She computes:For Alice,whereShe sends her public key to Bob.
- 2.
-
Bob selects as his secret key two tropical polynomials and , and a positive integer b. He computes:For Bob,whereHe sends his public key to Alice.
- 3.
- Alice computes the common key:
- 4.
- Bob computes the common key:
3.5. Implementation two - Tropical Block Matrix KEP using Linde-de la Puente Matrices
- 1.
-
Alice selects as her secret key two Linde-de la Puente matrices and , and a positive integer a. She computes:whereShe sends her public key to Bob.
- 2.
-
Bob selects as his secret key two Linde-de la Puente matrices and , and a positive integer b. He computes:whereHe sends his public key to Alice.
- 3.
- Alice computes the common key:
- 4.
- Bob computes the common key:
3.6. Advantages of our Protocols
- In the protocol suggested in [23], 4 messages are exchanged between users via a public (unsecured) channel. In our protocols, only two messages are exchanged. This results in Improved security and Saving time and resources.
- Our protocols operate in tropical semirings, where the operations are only max/min and +. This means that operations in our protocols are significantly faster than operations in the finite field .
- Our protocols do not use linear expressions for the general term, thus rendering traditional linear algebra tools ineffective.
4. Security Analysis
4.1. Matrix Decomposition Problem
4.2. Parameters for Enhanced Security
- Employ tropical matrices of at least order 60, ensuring a substantial level of complexity in the matrix operations.
- Select matrix entries randomly within the range , which expands the solution space significantly.
- The secret integers a and b should be chosen to be no less than , further increasing the computational challenge for any potential attacker.
4.3. Comparison with Existing Protocols
- Reduced key sizes are a feature since commuting matrix sets are not exchanged. For an matrix, only values are transmitted instead of .
- The protocols leverage the computational efficiency of tropical semirings, where matrix multiplication is performed in time rather than time as in finite fields.
- A decrease in the number of message exchanges is also observed, with the proposed protocols requiring only two exchanges compared to four in traditional approaches, thus reducing communication overhead.
5. Conclusion
References
- Varadharajan, V.; Odoni, R. Extension of rsa cryptosystems to matrix rings. Cryptologia 1985, 9, 140â153. [Google Scholar] [CrossRef]
- Maxrizal. Public Key Cryptosystem Based on Singular Matrix. Trends in Sciences 2022, 19. [Google Scholar] [CrossRef]
- Maxrizal; Prayanti, B.; Sujono. Generalization of Public Key Cryptosystem Based on Singular Matrix Using Ring of Integer Modulo 2022. pp. 1â4. [CrossRef]
- Maxrizal; Irawadi, S. Nonsingular matrix as private key on ElGamal cryptosystem 2021. 1821. [CrossRef]
- Rahman, N.; Shpilrain, V. MOBS: Matrices Over Bit Strings public key exchange. IACR Cryptology ePrint Archive 2021, pp. 1â7. Also available at: https://ia.cr/2021/560.
- Gupta, S.; Sanghi, M. A New Digital Signature Scheme Using Tribonacci Matrices. International Journal of Computer and Information Technology(2279-0764) 2020, 9, 64â71. [Google Scholar] [CrossRef]
- Koukouvinos, C.; Simos, D. Encryption Schemes based on Hadamard Matrices with Circulant Cores Design of Cryptographic Algorithms. Unknown Journal 2013, 3, 17â41. [Google Scholar]
- Zhang, L., T. C.S.Y.H.H.T.H.; Lei, Z. Optical single-channel cryptosystem based on the non-negative matrix factorization and face biometric in cyan-magenta-yellow-black color space. Journal of the Optical Society of America. A, Optics, image science, and vision 2023, 40, 2146â2155. [Google Scholar] [CrossRef] [PubMed]
- Gudepu, R.; Rao, D. A public key cryptosystem based on lattice matrices. Journal of Mathematical and Computational Science 2020, 10, 2408â2421. [Google Scholar] [CrossRef]
- Durcheva, M. Semirings as building blocks in cryptography; Cambridge Scholars Publishing, 2020.
- Durcheva, M. TrES: Tropical Encryption Scheme Based on Double Key Exchange. European Journal of Information Technologies and Computer Science 2022, 2, 11â17. [Google Scholar] [CrossRef]
- Huang, H.; Li, C.; Deng, L. Public-Key Cryptography Based on Tropical Circular Matrices. Applied Sciences 2022, 12, 1â12. [Google Scholar] [CrossRef]
- Huang, H. Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices. Symmetry 2022, 14. [Google Scholar] [CrossRef]
- Huang, H.; Li, C. Tropical Cryptography Based on Multiple Exponentiation Problem of Matrices. Security and Communication Networks 2022. [Google Scholar] [CrossRef]
- Muanalifah, A.; Sergeev, S. Modifying the Tropical Version of Stickelâs Key Exchange Protocol. Applications of Mathematics 2020, 65, 727â753. [Google Scholar] [CrossRef]
- Battarbee, C.; Kahrobaei, D.; Shahandashti, S. Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings 2021. pp. 1â11.
- Battarbee, C.; others. On the efficiency of a general attack against the MOBS cryptosystem. Journal of Mathematical Cryptology 2022, 16, 289â297. [Google Scholar] [CrossRef]
- Jiang, X.; Huang, H.; Pan, G. Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange. Journal of Cyber Security and Mobility 2023, 12, 205â220. [Google Scholar] [CrossRef]
- Brown, D.; Koblitz, N.; Legrow, J. Cryptanalysis of â MAKE â. Journal of Mathematical Cryptology 2022, 16, 98â102. [Google Scholar] [CrossRef]
- Raja, K. N..A.P. A Cryptosystem Based on Hilbert Matrix using Cipher Block Chaining Mode. ArXiv, abs/1110.1498, 2011. [Google Scholar]
- Jayanti, S., C. K..A.C. Cryptosystem of Skewed Affine Cipher Over Elliptic Curves with Block Matrix. ECS Transactions 2022, 07(1), 15071â15080. [Google Scholar] [CrossRef]
- Ramesh, M.; Kumar, B.H.; Srinagesh, A. A Novel Block-Cipher Mechanism for Information Security in Cloud System. 2016 IEEE 6th International Conference on Advanced Computing (IACC) 2016, pp. 524â528. [CrossRef]
- Zeriouh, M.; Chillali, A.; Boua, A. Cryptography based on the matrices. Boletim da Sociedade Paranaense de Matematica 2019, 37, 75â83. [Google Scholar] [CrossRef]
- An, J.H. Authenticated encryption in the public-key setting: Security notions and analyses. 169.



| Matrix Size | Duration 1 | Duration 2 | Duration 3 | Memory 1 | Memory 2 | Memory 3 |
|---|---|---|---|---|---|---|
| 60 | 0.03 | 0.01 | 0.02 | 0.05 | 0.05 | 0.05 |
| 65 | 0.04 | 0.02 | 0.03 | 0.06 | 0.06 | 0.06 |
| 70 | 0.06 | 0.03 | 0.04 | 0.07 | 0.07 | 0.07 |
| 75 | 0.08 | 0.04 | 0.06 | 0.08 | 0.08 | 0.08 |
| 80 | 0.12 | 0.06 | 0.09 | 0.09 | 0.09 | 0.09 |
| 85 | 0.18 | 0.09 | 0.13 | 0.10 | 0.10 | 0.10 |
| 90 | 0.24 | 0.13 | 0.18 | 0.12 | 0.12 | 0.12 |
| Matrix Size | Private 1 | Public 1 | Private 2 | Public 2 | Private 3 | Public 3 |
|---|---|---|---|---|---|---|
| 60 | 27.3 | 2191.2 | 27.3 | 27.3 | 27.3 | 27.3 |
| 65 | 32.3 | 2592.5 | 32.3 | 32.3 | 32.3 | 32.3 |
| 70 | 37.5 | 3008.7 | 37.5 | 37.5 | 37.5 | 37.5 |
| 75 | 43.0 | 3439.9 | 43.0 | 43.0 | 43.0 | 43.0 |
| 80 | 48.8 | 3885.9 | 48.8 | 48.8 | 48.8 | 48.8 |
| 85 | 54.8 | 4346.9 | 54.8 | 54.8 | 54.8 | 54.8 |
| 90 | 61.0 | 4822.7 | 61.0 | 61.0 | 61.0 | 61.0 |
Disclaimer/Publisherâs Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).