1. Introduction
The integer factorization problem and the discrete logarithm problem are the two primary computing problems used in modern public-key encryption. For instance, the discrete logarithm problem provides the basis for the Diffie–Hellman key exchange protocol and ElGamal encryption [
1,
2]. On a quantum computer, Shor devised a quantum algorithm that can solve the discrete logarithm problem and the integer factorization problem in polynomial time [
3]. Therefore, creating additional novel cryptosystems is a current study area for cryptography [
4]. Traditional cryptosystems rely on a variety of commutative rings, including integer ring, residue class ring, and finite field. Numerous cryptologists seek out additional algebraic structures in an effort to create fresh public key cryptosystems [
5]. More specifically, we generally hope to design some cryptosystems based on NP-hard problems of new algebraic structures (a problem is NP-hard if there exists some NP-complete problem that reduces to it in polynomial time).
One of the first cryptosystems based on semi-groups and semi-rings was proposed by Maze, Monico, and Rosenthal [
6,
7]. However, Steinwandt et al. eventually managed to crack it [
8]. A cryptosystem based on semi-module over factor semi-ring was proposed by Atani [
9]. Durcheva built cryptographic protocols using some idempotent semi-rings [
10]. Ahmed et al. [
11] cryptanalyzed these schemes in detail. By demonstrating that it is NP-hard to solve the tropical system of nonlinear equations, Grigoriev and Shpilrain [
12] proposed employing tropical semi-rings to create public-key cryptosystems. Because tropical schemes do not require any number multiplications because addition is the norm in tropical multiplication, employing tropical algebras as platforms offers unequalled efficiency. However, even if an element is a matrix over a tropical algebra, its tropical powers still show some patterns. Kotov and Ushakov [
13] set up a reasonably successful attack on one of Grigoriev and Shpilrain’s schemes by taking advantage of this weakness.
The initial approach was enhanced by Grigoreiv and Shpilrain, who also suggested public key cryptosystems using the semi-direct product of tropical semi-rings [
14]. However, Rudy and Monico [
15] and Isaac and Kahrobei [
16] have recently proposed some attacks on the upgraded schemes.
Symmetric matrices and congruent transformations of matrices have many important conclusions and applications in classical algebra [
17,
18,
19]. But in tropical algebra, there are no similar results. For example, a tropical symmetric matrix is generally not congruent with a diagonal matrix. This paper suggests a public-key encryption and key exchange protocol based on the congruent transformation of a symmetric tropical matrix by a tropical circular matrix. These cryptosystems can withstand all known attacks, including the KU attack, RM attack, and IK attack, because the employed commutative semiring cannot be embodied by known matrices, and the addition operation of the matrix and the power of the matrix are not used in our cryptosystems. If the computational congruent transformation problem and decisional congruent transformation problem are hard, our cryptosystems are secure. By using symmetric matrices and congruent transformation, the length of the public key and private key of our cryptosystem is half that reported in [
12,
14].
The remainder of the paper is structured as follows. In 
Section 2, we concentrate on a few definitions that are fundamental concepts in tropical matrix algebra. In 
Section 3, we present the new public-key cryptosystems based on congruent transformation of symmetric tropical matrix by tropical circular matrix. Then, in 
Section 4, we examine the protocol’s security and parameter choice. 
Section 5 provides the conclusion and recommendations for additional research.
  2. Preliminaries
Let  be a non-empty set with operations “+” and “”. Then  is called a semi-ring if the following conditions hold:
- (1)
  is a commutative semi-group with zero element 0;
- (2)
  is a semi-group with an identity element  and  ;
- (3)
 the left and right distribution laws for addition are satisfied by multiplication;
- (4)
 for all , .
If the multiplication operation is commutative, then 
S is called a commutative semi-ring. Integer tropical commutative semi-ring is the set 
 with addition operation and multiplication operation as follows: 
Then 
 is a commutative semi-ring. Its zero element and identity element are 
 and 0, respectively [
12]. Let 
 be the set of all 
 matrices over 
. We can also define the tropical matrix addition operation and multiplication operation.
      
A matrix 
 is called a 
t-circular matrix if it has the following form,
      
We denote 
 by 
 (or 
). Let
      
It is easy to verify that  is a commutative sub-semiring of .
For a matrix 
, the transpose of 
 is denoted by 
. If 
, then 
 is called a symmetric matrix. For matrices 
, if there exists a matrix 
 such that 
, then 
 are congruent. Let
      
If Y is a symmetric matrix and , then  is also symmetric.
Let P1 and P2 be two computational problems. P1 is said to polytime reduce to P2, written P1  P2, if there is an algorithm that solves P1 which uses, as a subroutine, an algorithm for solving P2, and which runs in polynomial time if the algorithm for P2 does. If P1  P2  and P2  P1, then P1 and P2 are said to be computationally equivalent.
Let 
 be the 
n-ary polynomial semiring over 
. Let
      
If 
, 
, then the following tropical system is called a tropical system of nonlinear equations,
      
As we know, the problem of solving a tropical system of nonlinear equations is NP-hard [
12]. 
In what follows, we sometimes denote  as  for simplicity, and  is two positive integers.
  4. Security Analysis and Parameter Selection
According to Theorems 1–3, Protocol 1 and Cryptosystem 1 can be attacked using a successful algorithm for resolving the congruent transformation problem.
Proposition 3. CTP can be reduced to the problem of solving tropical system of nonlinear equations in polynomial time.
 Proof of Proposition 3. Let  and . Suppose . Now, we want to find a matrix  such that , given the matrices  and .
 Let 
. Then
      
Since  and  are known, we get a tropical system of nonlinear equations about  with  unknowns and  equations. Note that N is also symmetric. □
As is well known, it is typically NP-hard to solve tropical systems of nonlinear equations [
12]. We provide an exponentially complex problem-solving approach for congruent transformations.
Proposition 4. There is an algorithm of solving CTP with computational complexity.
 Proof of Proposition 4. Through Proposition 3, we can get a tropical system of nonlinear equations about 
 with 
 unknowns and 
 equations. Every term of the equations is in the form of 
 (
). Denote 
 Subsequently, a tropical system of linear equations is obtained with 
 unknowns 
 and 
 equations. We can obtain a tropical system of nonlinear equations by solving the tropical system of linear equations of 
 as follows,
      
Since the multiplication in tropical algebra is the ordinary addition, it is actually a system of linear equations over an integer ring. However, we have 
 unknowns and 
 equations. The linear equation system typically has no solution. However, if 
 equations of these 
 equations have a solution, it may be possible to find 
 such that
      
The complexity of solving a tropical system of linear equations with 
 unknowns 
 and 
 equations is 
. Since there are 
 equations with 
 in the system
      
There are more than  options available when choosing  equations from  equations. When there are  equations and  unknowns, the complexity of solving integer linear equations is . As a result,  is the computational complexity of the aforementioned algorithm. □
In 
Appendix B, an example of CTP with small parameters is demonstrated.
The commutative subsemiring in our cryptosystems is that of 
t-circular matrices. This is different from [
12,
14]. They used a known matrix 
 and then adopted the commutative subsemi-ring 
. Kotov and Ushakov [
13] created an effective technique (KU Attack Algorithm) to attack the key exchange protocol in [
12] because the secret matrix may be represented as a polynomial of 
. Let
      
      where 
, and 
d is the upper bound for the degrees of polynomials. 
 gives 
. This gives
      
      where 
. Algorithm 1 is a precise description of a KU attack.
      
| Algorithm 1: (KU Attack) | 
Input: , . Output: , such that ,where , . (1) Compute  and ; (2) Among minimal covers of  by , which are all minimal subsets  such that    find the cover satisfying the following conditions    | 
Our cryptosystems can withstand KU attack because the employed commutative subsemi-rings of circular matrices cannot be represented by a known matrix.
The initial approach was enhanced by Grigoreiv and Shpilrain [
14], who also suggested public key cryptosystems based on the semidirect product of tropical matrices. However, the addition of the tropical matrix is included in the first part of the semidirect product multiplication. As a result, the powers of semidirect product multiplication have partial order preservation. By this characteristic, Rudy and Monico [
15] created a straightforward binary search algorithm (RM Attack), which they used to break the cryptosystem of [
14]. The RM attack is described in pseudocode in Algorithm 2.
      
| Algorithm 2: (RM Attack) | 
Input: , where , for an integer n (). Output: n. (1) Let  and ; (2) Run the subsequent loop when . (i)  (ii) Compute . If , ; If , ; If , output . | 
In our cryptosystems, there is no tropical matrix addition operation and the partial order cannot be used. Thus, our cryptosystems can resist RM attack.
Isaac and Kahrobaei [
16] proposed another cryptanalysis of the cryptosystems in [
13]. They use the public matrices to derive a user’s private key by finding the almost linear period of tropical matrix. Let 
 is a sequence of matrices. If there exist positive integers 
p, 
d and a constant 
c such that for all 
 indices 
 the equation 
 holds, then 
d is called the defect of the sequence of matrices and p is called the almost linear period of the sequence of matrices. The IK attack is described in pseudocode in Algorithm 3.
      
| Algorithm 3: (IK Attack) | 
Input: , where , for an integer n (). Output: n. (1) Construct a sequence of matrices , where ; (2) Find the defect d and almost linear period p of  by the sequence of matrices , where ; (3) Enumerate r from 1 to p-1 such that  is x times ; (4) Output . | 
In our cryptosystems, there is not any power of matrix. This class of attack does not work for our cryptosystems.
We evaluate the security of our proposed cryptosystem [
12,
14], and other pertinent cryptosystems. 
Table 1 presents the comparing findings.
Note that the length of public key and private key of our cryptosystem is half that described in [
12,
14] by using symmetric matrices and congruent transformation. Let secret key 
. It is clear that 
 can be taken as the secret key. If 
, then the length of a secret key is less than 
 bits. Public key 
 is a symmetric matrix. We can take the upper triangular part of 
 as the public key. The length of a public key is less than 
 bits.
Let 
 and the entries of matrices are the integer in 
. The highest limits of the size of the secret key and public key for various values are shown in 
Table 2. The experimental results show that the time of the operation 
 is about 1ms (Experimental platform: Intel(R) Core(TM) i7-5500U CPU @ 2.40GHz). We suggest 
 to avoid potential heuristic attacks similar to KU attacks. The larger 
k can ensure that the cryptosystem is more secure. However, in a resource-constrained environment, the public key and private key should not be too large. Therefore, the size of 
k depends on the occasion of use.