Previous Article in Journal
DEEPEIA: Conceptualizing a Generative Deep Learning Foreign Market Recommender for SMEs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Secret Cryptographic Key Sharing Through the Integer Partition Function

by
Daniel Fernandes da Nobrega
1,
Marcio Luís Munhoz Amorim
1,
Sérgio F. Lopes
2,3,
João Paulo Carmo
1,
José A. Afonso
2,3,* and
Mario Gazziro
4
1
Group of Metamaterials Microwaves and Optics (GMeta), Department of Electrical Engineering (SEL), University of São Paulo (USP), Avenida Trabalhador São-Carlense, Nr. 400, Parque Industrial Arnold Schimidt, São Carlos 13566-590, Brazil
2
CMEMS-UMinho, University of Minho, 4804-533 Guimarães, Portugal
3
LABBELS—Associate Laboratory, University of Minho, 4710-057 Braga, Portugal
4
Information Engineering Group, Department of Engineering and Social Sciences (CECS), Federal University of ABC (UFABC), Av. dos Estados, 5001, Santo André 09210-580, Brazil
*
Author to whom correspondence should be addressed.
Information 2025, 16(8), 637; https://doi.org/10.3390/info16080637
Submission received: 24 June 2025 / Revised: 22 July 2025 / Accepted: 24 July 2025 / Published: 25 July 2025

Abstract

Secret key exchange is a necessary function for modern cryptography. The integer partition function is a mathematical function that arises from number theory. New methods for computing the integer partition function were developed and evaluated in the context of this paper, as well as new methods for using the integer partition function in a secret key exchange. The methods were categorized into single-variable and multiple-variable methods. The single-variable methods were found to be insecure. The multiple-variable methods were shown to be vulnerable to attacks that solve a linear system. These methods were implemented in microcontrollers using the C++ programming language. Experiments were conducted to evaluate the security of the developed methods in a wireless key exchange scenario. It was concluded that the security provided by the key exchange of the developed methods was low.
Keywords: cryptography; integer partitions; secret key exchange; number theory cryptography; integer partitions; secret key exchange; number theory

Share and Cite

MDPI and ACS Style

Nobrega, D.F.d.; Amorim, M.L.M.; Lopes, S.F.; Carmo, J.P.; Afonso, J.A.; Gazziro, M. Secret Cryptographic Key Sharing Through the Integer Partition Function. Information 2025, 16, 637. https://doi.org/10.3390/info16080637

AMA Style

Nobrega DFd, Amorim MLM, Lopes SF, Carmo JP, Afonso JA, Gazziro M. Secret Cryptographic Key Sharing Through the Integer Partition Function. Information. 2025; 16(8):637. https://doi.org/10.3390/info16080637

Chicago/Turabian Style

Nobrega, Daniel Fernandes da, Marcio Luís Munhoz Amorim, Sérgio F. Lopes, João Paulo Carmo, José A. Afonso, and Mario Gazziro. 2025. "Secret Cryptographic Key Sharing Through the Integer Partition Function" Information 16, no. 8: 637. https://doi.org/10.3390/info16080637

APA Style

Nobrega, D. F. d., Amorim, M. L. M., Lopes, S. F., Carmo, J. P., Afonso, J. A., & Gazziro, M. (2025). Secret Cryptographic Key Sharing Through the Integer Partition Function. Information, 16(8), 637. https://doi.org/10.3390/info16080637

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop