Secure Key Exchange in Tropical Cryptography: Leveraging Efficiency with Advanced Block Matrix Protocols
Abstract
:1. Introduction and Motivation
- We introduce two key exchange protocols that exploit the commutative properties of tropical block matrices, thereby simplifying the key exchange process while enhancing security.
- A thorough analysis is presented to demonstrate the reduced operational overhead compared to existing block matrix schemes. This includes comparative evaluations showing lower computational complexity while maintaining equivalent key sizes.
- We anchor our security claims in the inherent difficulty of matrix decomposition within tropical semirings, a challenge that poses significant barriers to conventional attack methodologies.
- Finally, this paper includes illustrative examples and comparative analyses to underscore the tangible efficiency gains that our protocols offer.
2. Preliminaries
- forms a commutative monoid with identity element 0.
- forms a monoid with identity element 1.
- ⊗ distributes over ⊕.
- For all , .
2.1. Exponentiation of Block Matrices
2.2. Tropical Semirings
2.3. Commutative Matrices in Tropical Semirings
3. Block Matrix Key Exchange Protocols
3.1. The Original Protocol
- Alice chooses as her private keys one positive integer l and a matrix . She transmits the set of matrices commuting with A.
- Bob chooses as his private keys one positive integer k and a matrix . He transmits the set of matrices commuting with Y.
- Alice chooses as her second private key a matrix . She calculates
- Bob chooses as his second private key a matrix . He calculates
- Alice computes the common private key
- Bob computes the common private key
- Alice selects matrices A and B and Bob selects matrices C and D, with the property that A and C commute while B and D also commute. This means that A and C belong to the same set of commuting matrices, while B and D also belong to the same set of commuting matrices. Alice and Bob agree on a matrix T. The secret keys of the users are positive integers a and b, respectively,
- Alice computes
- Bob computes
- Alice computes the common key
- Bob computes the common key
3.2. Proposed Solution
3.3. Protocol Steps
- Both parties agree on a common matrix T.
- Alice opts for matrices A and B, while Bob picks matrices C and D. They ensure that A commutes with C and that B commutes with D.
- Alice calculates . Her public key is set as .
- Bob, in a parallel manner, computes . He sets his public key as .
- They exchange their public keys.
- Using Bob’s public key and her private matrices, Alice computes the shared key .
- Similarly, using Alice’s public key and his private matrices, Bob computes the shared key .
- Due to the inherent commutative properties, both parties find that .
3.4. Implementation One—Tropical Block Matrix KEP Using Polynomials of Matrices
- Alice selects as her secret key two tropical polynomials and and a positive integer a. She computes
- Bob selects as his secret key two tropical polynomials and and a positive integer b. He computes
- Alice computes the common key
- Bob computes the common key
3.5. Implementation Two—Tropical Block Matrix KEP Using Linde–de la Puente Matrices
- Tropical semiring .
- One negative real number r and one positive real number c.
- An arbitrary square tropical matrix T of order n over this semiring.
- Alice selects as her secret key two Linde–de la Puente matrices and and a positive integer a. She computes
- Bob selects as his secret key two Linde–de la Puente matrices and and a positive integer b. He computes
- Alice computes the common key
- Bob computes the common key
3.6. Advantages of Our Protocols
- In the protocol suggested in [26], four messages are exchanged between the users via public (unsecured) channel. In our protocols, only two messages are exchanged. This results in improved security and saving time and resources.
- Our protocols operate in tropical semirings, where the operations are only max/min and +. This means that operations in our protocols are significantly faster than operations in the finite field .
- Our protocols do not use linear expressions for the general term, rendering traditional linear algebra tools ineffective.
4. Numerical Example: Tropical Block Matrix KEP Using Polynomials of Matrices
4.1. Definitions and Initial Setup
4.1.1. Matrix Definitions
4.1.2. Tropical Polynomials
4.2. Computations by Alice
4.3. Computations by Bob
4.4. Shared Secret Key Computation
5. Security Analysis
5.1. Matrix Decomposition Problem
5.2. Parameters for Enhanced Security
- Employ tropical matrices of at least order 60, ensuring a substantial level of complexity in the matrix operations.
- Select matrix entries randomly within the range , which expands the solution space significantly.
- The secret integers a and b should be chosen to be no less than , further increasing the computational challenge for any potential attacker.
5.3. Comparison with Existing Protocols
- Reduced key sizes are a feature, as commuting matrix sets are not exchanged. For an matrix, only values are transmitted instead of .
- Our protocols leverage the computational efficiency of tropical semirings, where matrix multiplication is performed in time rather than time as in finite fields.
- A decrease in the number of message exchanges is observed, with the proposed protocols requiring only two exchanges compared to four in traditional approaches, resulting in reduced communication overhead.
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Varadharajan, V.; Odoni, R. Extension of rsa cryptosystems to matrix rings. Cryptologia 1985, 9, 140–153. [Google Scholar] [CrossRef]
- Maxrizal, M. Public Key Cryptosystem Based on Singular Matrix. Trends Sci. 2022, 19, 2147. [Google Scholar] [CrossRef]
- Prayanti, B.D.A. Generalization of Public Key Cryptosystem Based on Singular Matrix Using Ring of Integer Modulo. In Proceedings of the 2022 4th International Conference on Cybernetics and Intelligent System (ICORIS), Prapat, Indonesia, 8–9 October 2022; pp. 1–4. [Google Scholar] [CrossRef]
- Irawadi, S. Nonsingular matrix as private key on ElGamal cryptosystem. J. Phys. Conf. Ser. 2021, 1821, 012018. [Google Scholar] [CrossRef]
- Rahman, N.; Shpilrain, V. MOBS: Matrices Over Bit Strings Public Key Exchange. IACR Cryptol. ePrint Arch. 2021, 1–7. Available online: https://ia.cr/2021/560 (accessed on 2 June 2021).
- Gupta, S.; Sanghi, M. A New Digital Signature Scheme Using Tribonacci Matrices. Int. J. Comput. Inf. Technol. 2020, 9, 64–71. [Google Scholar] [CrossRef]
- Koukouvinos, C.; Simos, D. Encryption Schemes based on Hadamard Matrices with Circulant Cores Design of Cryptographic Algorithms. Unkn. J. 2013, 3, 17–41. [Google Scholar]
- Zhang, L.; Tang, C.; Shen, Y.; He, H.; Tang, H.; Lei, Z. Optical single-channel cryptosystem based on the non-negative matrix factorization and face biometric in cyan-magenta-yellow-black color space. J. Opt. Soc. Am. A Opt. Image Sci. Vis. 2023, 40, 2146–2155. [Google Scholar] [CrossRef]
- Gudepu, R.; Rao, D. A public key cryptosystem based on lattice matrices. J. Math. Comput. Sci. 2020, 10, 2408–2421. [Google Scholar] [CrossRef]
- Grigoriev, D. Complexity in Tropical Algebra. In Proceedings of the International Workshop on Computer Algebra in Scientific Computing, Berlin, Germany, 9–13 September 2013; pp. 148–154. [Google Scholar]
- Durcheva, M. Semirings as Building Blocks in Cryptography; Cambridge Scholars Publishing: Cambridge, UK, 2020. [Google Scholar]
- Durcheva, M. TrES: Tropical Encryption Scheme Based on Double Key Exchange. Eur. J. Inf. Technol. Comput. Sci. 2022, 2, 11–17. [Google Scholar] [CrossRef]
- Huang, H.; Li, C.; Deng, L. Public-Key Cryptography Based on Tropical Circular Matrices. Appl. Sci. 2022, 12, 7401. [Google Scholar] [CrossRef]
- Huang, H. Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices. Symmetry 2022, 14, 2378. [Google Scholar] [CrossRef]
- Huang, H.; Li, C. Tropical Cryptography Based on Multiple Exponentiation Problem of Matrices. Secur. Commun. Netw. 2022, 2022, 1024161. [Google Scholar] [CrossRef]
- Muanalifah, A.; Sergeev, S. Modifying the Tropical Version of Stickel’s Key Exchange Protocol. Appl. Math. 2020, 65, 727–753. [Google Scholar] [CrossRef]
- Battarbee, C.; Kahrobaei, D.; Shahandashti, S. Cryptanalysis of Semidirect Product Key Exchange Using Matrices over Non-Commutative Rings. arXiv 2021, arXiv:2105.07692. [Google Scholar]
- Battarbee, C.; Kahrobaei, D.; Tailor, D.; Shahandashti, S.F. On the efficiency of a general attack against the MOBS cryptosystem. J. Math. Cryptol. 2022, 16, 289–297. [Google Scholar] [CrossRef]
- Jiang, X.; Huang, H.; Pan, G. Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange. J. Cyber Secur. Mobil. 2023, 12, 205–220. [Google Scholar] [CrossRef]
- Brown, D.; Koblitz, N.; Legrow, J. Cryptanalysis of “MAKE”. J. Math. Cryptol. 2022, 16, 98–102. [Google Scholar] [CrossRef]
- Isaac, S.; Kahrobaei, D. A closer look at the tropical cryptography. Int. J. Comput. Math. Comput. Syst. Theory 2021, 6, 137–142. [Google Scholar] [CrossRef]
- Kotov, M.; Ushakov, A. Analysis of a key exchange protocol based on tropical matrix algebra. J. Math. Cryptol. 2018, 12, 137–141. [Google Scholar] [CrossRef]
- Raja, P.V.K.; Chakravarthy, A.S.N.; Avadhani, P.S. A Cryptosystem Based on Hilbert Matrix using Cipher Block Chaining Mode. arXiv 2011, arXiv:1110.1498. [Google Scholar]
- Jayanti, S.; Chittibabu1, K.; Akkapeddi1, C.S. Cryptosystem of Skewed Affine Cipher Over Elliptic Curves with Block Matrix. ECS Trans. 2022, 107, 15071–15080. [Google Scholar] [CrossRef]
- Ramesh, M.; Kumar, B.H.; Srinagesh, A. A Novel Block-Cipher Mechanism for Information Security in Cloud System. In Proceedings of the 2016 IEEE 6th International Conference on Advanced Computing (IACC), Bhimavaram, India, 27–28 February 2016; pp. 524–528. [Google Scholar] [CrossRef]
- Zeriouh, M.; Chillali, A.; Boua, A. Cryptography based on the matrices. Bol. Soc. Parana. Mat. 2019, 37, 75–83. [Google Scholar] [CrossRef]
- An, J.H. Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses. Available online: http://eprint.iacr.org/2001/079 (accessed on 12 September 2001).
Matrix Size | Algo. 1 Duration | Algo. 2 Duration | Algo. 3 Duration | Algo. 1 Memory | Algo. 2 Memory | Algo. 3 Memory |
---|---|---|---|---|---|---|
60 | 0.03 | 0.01 | 0.02 | 0.05 | 0.05 | 0.05 |
65 | 0.04 | 0.02 | 0.03 | 0.06 | 0.06 | 0.06 |
70 | 0.06 | 0.03 | 0.04 | 0.07 | 0.07 | 0.07 |
75 | 0.08 | 0.04 | 0.06 | 0.08 | 0.08 | 0.08 |
80 | 0.12 | 0.06 | 0.09 | 0.09 | 0.09 | 0.09 |
85 | 0.18 | 0.09 | 0.13 | 0.10 | 0.10 | 0.10 |
90 | 0.24 | 0.13 | 0.18 | 0.12 | 0.12 | 0.12 |
Matrix Size | Algo. 1 Private Key | Algo. 1 Public Key | Algo. 2 Private Key | Algo. 2 Public Key | Algo. 3 Private Key | Algo. 3 Public Key |
---|---|---|---|---|---|---|
60 | 27.3 | 2191.2 | 27.3 | 27.3 | 27.3 | 27.3 |
65 | 32.3 | 2592.5 | 32.3 | 32.3 | 32.3 | 32.3 |
70 | 37.5 | 3008.7 | 37.5 | 37.5 | 37.5 | 37.5 |
75 | 43.0 | 3439.9 | 43.0 | 43.0 | 43.0 | 43.0 |
80 | 48.8 | 3885.9 | 48.8 | 48.8 | 48.8 | 48.8 |
85 | 54.8 | 4346.9 | 54.8 | 54.8 | 54.8 | 54.8 |
90 | 61.0 | 4822.7 | 61.0 | 61.0 | 61.0 | 61.0 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Durcheva, M.; Danilchenko, K. Secure Key Exchange in Tropical Cryptography: Leveraging Efficiency with Advanced Block Matrix Protocols. Mathematics 2024, 12, 1429. https://doi.org/10.3390/math12101429
Durcheva M, Danilchenko K. Secure Key Exchange in Tropical Cryptography: Leveraging Efficiency with Advanced Block Matrix Protocols. Mathematics. 2024; 12(10):1429. https://doi.org/10.3390/math12101429
Chicago/Turabian StyleDurcheva, Mariana, and Kiril Danilchenko. 2024. "Secure Key Exchange in Tropical Cryptography: Leveraging Efficiency with Advanced Block Matrix Protocols" Mathematics 12, no. 10: 1429. https://doi.org/10.3390/math12101429
APA StyleDurcheva, M., & Danilchenko, K. (2024). Secure Key Exchange in Tropical Cryptography: Leveraging Efficiency with Advanced Block Matrix Protocols. Mathematics, 12(10), 1429. https://doi.org/10.3390/math12101429