Next Article in Journal
On Tabu Search for Block Cyphers Cryptanalysis
Previous Article in Journal
Secure Implementation of RISC-V’s Scalar Cryptography Extension Set
 
 
Due to scheduled maintenance work on our servers, there may be short service disruptions on this website between 11:00 and 12:00 CEST on March 28th.
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Autopotency and Conjugacy of Non-Diagonalizable Matrices for Challenge–Response Authentication

by
Daniel Alarcón-Narváez
1,*,
Luis Adrián Lizama-Pérez
2 and
Fausto Abraham Jacques-García
1
1
Computer Science, Autonomous University of Querétaro (UAQ), Av. de las Ciencias, Querétaro 76230, Querétaro, Mexico
2
Department of Electronics, Universidad Técnica Federico Santa María, Av. Vicuña Mackenna, San Joaquín 8940897, Chile
*
Author to whom correspondence should be addressed.
Cryptography 2026, 10(1), 7; https://doi.org/10.3390/cryptography10010007
Submission received: 22 December 2025 / Revised: 9 January 2026 / Accepted: 15 January 2026 / Published: 18 January 2026

Abstract

We present an algebraic framework for constructing challenge–response authentication protocols based on powers of non-diagonalizable matrices over finite fields. The construction relies on upper triangular Toeplitz matrices with a single Jordan block and on their structured power expansions, which induce nonlinear relations between matrix parameters and exponents through an autopotency phenomenon. The protocol is built from a cyclic family of matrix products derived from secret matrices ( A i ) i = 1 n G L k ( F p ) : for each index i, a product P i = A i A i + 1 A i + n 1 is formed (indices modulo n), and its power P i ( x ) is published for a secret exponent x. The resulting family of powered products is linked by conjugation via the unknown factors A i , enabling an interactive authentication mechanism in which the prover demonstrates the knowledge of selected factors by satisfying explicit conjugacy relations. We formalize the underlying algebraic problems in terms of factor recovery and conjugacy identification from powered products, and analyze how the enforced non-diagonalizable structure and Toeplitz constraints lead to coupled multivariate polynomial systems. These systems arise naturally from the algebraic design of the construction and do not admit immediate reductions to classical discrete logarithm settings. The framework illustrates how non-diagonalizable matrix structures and structured conjugacy relations can be used to define concrete authentication primitives in noncommutative algebraic settings, and provides a basis for further cryptanalytic and cryptographic investigation.

1. Introduction

The rapid advancement of quantum computing has precipitated an urgent need for cryptographic primitives that remain secure against quantum-capable adversaries [1,2]. Traditional public-key cryptosystems, which derive their security from the hardness of integer factorization or the discrete logarithm problem in finite fields and elliptic curves, are rendered vulnerable by Shor’s algorithm [3]. This existential threat has catalyzed global standardization efforts, notably by NIST and ETSI, to identify and vet post-quantum cryptographic (PQC) schemes [4,5]. The current PQC landscape is dominated by several families [6], including lattice-based constructions (e.g., Kyber [7,8] and Dilithium [9,10]), hash-based signatures (e.g., SPHINCS+ [11]), code-based encryption (e.g., Classic McEliece [12,13]), and multivariate cryptography [14,15].
Beyond these established families, there is growing interest in exploring algebraic constructions that deliberately depart from well-studied abelian settings and from assumptions that are already deeply integrated into the current standardization pipeline. Such exploratory approaches do not aim to replace mature PQC candidates, but rather to investigate alternative mathematical structures whose associated computational problems fall outside the scope of known classical and quantum algorithmic techniques. In this sense, post-quantum cryptography also encompasses the systematic study of non-standard hardness assumptions and algebraic phenomena that may give rise to future cryptographic primitives.
This work advances an alternative paradigm grounded in the linear algebra of finite fields. Expanding upon the foundational matrix-based framework introduced in [16], we delve deeper into the structural properties of the core mathematical objects involved and repurpose them as building blocks for a challenge–response authentication mechanism rather than for a traditional key exchange scheme. Our constructions operate within the algebra of k × k matrices over finite fields F p k × k , and rely on classical hardness assumptions involving noncommutative matrix problems, including the difficulty of factorizing structured matrix products and solving conjugacy-type equations in matrix groups [17,18].
The contribution of this work should be understood as an algebraic heuristic that is intentionally positioned outside the canon of reduction-based PQC schemes. We do not claim a formal post-quantum security reduction, nor do we assert resistance against all conceivable quantum adversaries. Instead, we focus on a class of noncommutative and non-diagonalizable matrix constructions whose induced computational problems do not appear to admit known reductions to abelian hidden subgroup problems or to other structures efficiently solvable by Shor-type quantum algorithms. From this perspective, the proposed framework is investigated as a potential post-quantum-oriented construction, motivated by structural considerations rather than by established complexity-theoretic guarantees.
Throughout the paper, our security discussion is explicitly carried out in the classical adversarial model; a full post-quantum analysis is beyond the scope of the present work.
A central tenet of our approach is the deliberate construction and utilization of non-diagonalizable matrices as fundamental building blocks. By ensuring that the relevant matrix products lack a full basis of eigenvectors, we prevent a straightforward reduction of exponentiation to a set of simpler, independent scalar discrete logarithm problems within the field, a common pitfall in naive matrix-based schemes. In particular, we focus on upper triangular Toeplitz matrices with a single Jordan block and exploit the structured way in which their powers depend on a small set of parameters and on the exponent.
The primary contributions of this article are twofold. First, we present a systematic and verifiable method for generating invertible non-diagonalizable matrices suitable for cryptographic applications. This is achieved through the controlled product of a diagonal matrix and a specifically structured upper triangular matrix, guaranteeing a defective eigenvalue structure that resists diagonalization. Second, we conduct a detailed structural analysis of matrix exponentiation for upper triangular Toeplitz matrices. We derive closed-form expressions for their powers and introduce the concept of autopotency—a collection of deterministic algebraic relationships between the entries of a matrix and the entries of its powers. These relationships can be efficiently verified by legitimate users in possession of certain secret parameters, but give rise to nonlinear multivariate systems of equations for any adversary attempting to deduce the base matrix or exponent from a public power, which we treat as a classical hardness assumption in our heuristic security discussion.
Building on these algebraic ingredients, we then design and analyze a noncommutative challenge–response protocol based on cyclic products of secret matrices and their powers. A prover holds a family of secret factors whose ordered products form a cycle of mutually conjugate matrices; the corresponding powered products are made public. In an authentication round, the verifier issues a challenge that selects one of these conjugacy relations, and the prover must reveal the appropriate secret factor so that the resulting conjugation equation is satisfied. We formalize the underlying factor recovery and conjugacy problems, state an explicit algebraic conjecture capturing their presumed hardness, and discuss how these problems differ from standard abelian discrete logarithm settings.
While challenge–response authentication is a classical paradigm, the novelty of the present work lies in its instantiation through structured non-diagonalizable matrix products, cyclic conjugacy relations, and autopotent algebraic constraints. The resulting protocol illustrates how these ingredients can be combined to define authentication tasks in noncommutative settings that are algebraically distinct from conventional discrete-logarithm-based constructions.
The remainder of this article is organized as follows. Section 2 reviews the algebraic background and notation used throughout the paper, including matrix groups over finite fields and the Toeplitz structures that underlie our constructions. Section 3 introduces the core noncommutative challenge–response authentication protocol, specifying the key generation procedure, the public data, and the interactive verification mechanism. Section 4 develops a systematic methodology for constructing invertible non-diagonalizable matrices, illustrated with a concrete example. Section 5 presents the theoretical foundations of autopotency in upper triangular Toeplitz matrices, deriving closed-form expressions for matrix powers and formulating the associated parameter recovery problems. Section 6 discusses practical parameter considerations, including recommended ranges for the matrix dimension and field size, as well as storage and implementation aspects. Section 7 reports our experimental evaluation, including preliminary performance measurements and computational complexity estimates for representative parameter sets. Finally, Section 8 summarizes the main contributions, and outlines directions for future research and implementation.

2. Algebraic Preliminaries

This section delineates the core protocol studied in this work. Rather than deriving a shared secret key as in a classical Diffie–Hellman-type construction, we now use the matrix framework as the basis for a noncommutative challenge–response authentication mechanism. The analysis incorporates the specific constructions of non-diagonalizable matrices detailed in Section 4 and the structural properties of their powers developed in Section 5. All cryptographic operations take place in the algebra of k × k matrices over the finite field F p , with F p k × k denoting the corresponding matrix space. The prime p is assumed to be cryptographically large (e.g., p > 2 256 ), so that the associated search spaces are beyond the reach of exhaustive methods. The fundamental security of the protocol is predicated on classical hardness assumptions involving structured matrix factorization and conjugacy problems within this noncommutative setting [17,18]. These assumptions are investigated here as part of a structurally motivated research direction, aimed at identifying algebraic configurations whose induced problems fall outside the scope of standard abelian reductions.
The protocol’s resilience stems from the deliberate choice of secret matrices in a noncommutative matrix group. Concretely, a prover (Bob) samples a family of secret matrices
A = ( A 1 , A 2 , , A n ) G L k ( F p )
from a structured set F of invertible, non-diagonalizable matrices constructed as in Section 4. From this family, he forms a cyclic sequence of ordered products
P i = A i A i + 1 A i + n 1 ,
where indices are taken modulo n, so that P i + 1 is obtained from P i by a cyclic rotation of the factors. By construction, each P i is invertible and non-diagonalizable, and the family ( P i ) i = 1 n consists of mutually conjugate elements:
A i 1 P i A i = P σ ( i ) ,
for a suitable rotation permutation σ of { 1 , , n } determined by the cyclic ordering of the factors.
To obfuscate the underlying factors while preserving this conjugacy structure, Bob selects a secret exponent x Z and publishes the powered products
P i ( x ) = P i x , i = 1 , , n .
Since conjugacy is stable under integer powers, the family ( P i ( x ) ) i = 1 n satisfies
A i 1 P i ( x ) A i = P σ ( i ) ( x ) ,
while the individual factors A i remain hidden. In the protocol, these relations are used as the basis for an interactive test of knowledge: a verifier challenges the prover to exhibit a factor A i consistent with a specific conjugacy relation among the public powered products.

2.1. Underlying Hardness Assumptions and Conjugacy Perspective

The public information in our framework consists of a family of powered products ( P i ( x ) ) i = 1 n built from secret matrices A 1 , , A n G L k ( F p ) as described above. At a high level, these matrices are related by conjugation via the unknown factors A i , and the challenge–response mechanism exploits precisely these conjugacy relations.
In this setting, we formulate the following problems.
Powered   Product   Identification   Problem   ( PPIP ) : ( P i ( x ) ) i = 1 n U s . t . U 1 P i ( x ) U = P j ( x ) for some j .
Factor   Recovery   Problem   ( FRP ) : ( P i ( x ) ) i = 1 n { A 1 , , A n } .
Both problems can be viewed as structured instances of the classical Conjugacy Search Problem (CSP) in non-abelian groups: given elements g ,   h with h = u 1 g u , the problem consists in recovering a conjugator u. In our case, the role of g and h is played by powered products such as P 1 ( x ) and P j ( x ) , and the potential conjugators are drawn from the closed family generated by the secret matrices A 1 , , A n .
In contrast to generic instances of CSP in matrix groups, the problems considered here are tightly constrained by the cyclic construction of the products, the fixed exponentiation layer, and the enforced non-diagonalizable Toeplitz structure of the matrices involved. These restrictions induce coupled algebraic relations that are not present in unconstrained conjugacy settings and play a central role in the intended hardness of PPIP and FRP.
We emphasize that neither PPIP nor FRP is intended as a unique recovery problem. The existence of multiple algebraic solutions arising from centralizers or commuting elements does not undermine the security interpretation of the protocol, since authentication relies solely on the ability to verify a conjugacy relation, rather than on reconstructing a canonical secret representation. This non-uniqueness is not a flaw of the formulation, but a direct consequence of the underlying non-abelian and structured setting. In the context of the proposed challenge–response protocol, the role of PPIP and FRP is to capture the difficulty of producing responses that are consistent with the cyclic conjugacy relations induced by the secret family, rather than to identify a unique secret representation. While alternative matrices may satisfy isolated conjugacy relations, such solutions do not, in general, enable an adversary to respond correctly to arbitrary challenges across multiple protocol executions without access to the full structured family.
The PPIP focuses on the existence of a non-trivial conjugator U linking two powered products, whereas FRP aims at recovering an explicit set of factors { A i } consistent with the published products. In both cases, the powered exponent x and the deliberately engineered non-diagonalizable structure are intended to move the instance away from settings where conjugacy can be efficiently decided.

2.2. Scope, Efficiency, and Intended Use

The primary objective of the present work is not to propose a drop-in replacement for established authentication standards, nor to compete directly with optimized post-quantum authentication schemes. Instead, the contribution is conceptual and structural: it introduces a new class of algebraic authentication problems arising from the conjugacy and factorization properties of non-diagonalizable matrix products. From a practical standpoint, the protocol is best suited for settings in which authentication is performed infrequently, or where one-time or bounded-use credentials are acceptable. Typical examples include bootstrapping phases, device provisioning, or experimental authentication mechanisms in constrained algebraic environments. The intentional revelation of individual secret factors during authentication makes the scheme inappropriate for indefinite reuse without refresh mechanisms, a limitation that is explicitly acknowledged. Regarding efficiency, the dominant computational costs arise from matrix multiplication and exponentiation in G L k ( F p ) . For the illustrative dimensions considered in this work ( k = 2 , 3 ), these operations are computationally feasible, while larger values of k quickly incur cubic-time overhead. Consequently, the intended hardness of the construction is not derived from large matrix dimensions, but from the combination of a large underlying field F p , the secret exponent x, and the structured nonlinearity induced by Toeplitz and autopotent constraints. No implementation or performance benchmarks are claimed in this work. A detailed evaluation of concrete parameter choices, optimization strategies, and implementation trade-offs is left as future work. The present manuscript should therefore be understood as a foundational exploration of algebraic authentication mechanisms in noncommutative settings, rather than as a fully engineered cryptographic primitive.
At a conceptual level, the bounded-use interpretation of the proposed protocol shares a high-level similarity with classical one-time or limited-use authentication mechanisms, such as one-time-password (OTP) schemes [19,20], in which security is achieved by consuming secret materials over time. However, the similarity is purely operational rather than structural: in contrast to hash-based or symmetric constructions, the present framework is entirely algebraic and relies on noncommutative conjugacy relations between structured matrix products, as explored in other noncommutative cryptographic contexts [21]. The objective of this work is therefore not to replicate or optimize existing OTP-style mechanisms, but to explore a distinct algebraic design space in which bounded-use authentication emerges naturally from the intentional revelation of structured factors.

2.3. Global Consistency Verification of the Powered Product Family

In the interactive challenge–response mechanism defined earlier, each round reveals a single secret matrix A i and allows the verifier to check a local conjugacy condition of the form
A i 1 P i ( x ) A i = P i + 1 ( x ) ,
or the corresponding rotated variant. Such checks ensure correctness for the challenged index, but they do not, by themselves, prevent an adversary from responding with ad hoc conjugators that satisfy each individual round without belonging to a globally consistent family ( A 1 , , A n ) .
To address this, we consider a stronger post-challenge step—a global consistency verification. After all challenge rounds conclude, the prover discloses the complete tuple
( A 1 , , A n ) and the exponent x ,
and the verifier reconstructs the cyclic products
P ˜ i : = A i A i + 1 A n A 1 A i 1 , i = 1 , , n ,
with indices taken modulo n. Correctness requires that for every i,
P ˜ i x = ? P i ( x ) .
This post hoc verification enforces two global algebraic constraints:
1.
Consistency of the factor family. The prover must now exhibit matrices ( A 1 , , A n ) whose cyclic products generate all published powered matrices. This eliminates strategies where the prover produces unrelated conjugators for individual rounds without forming a coherent solution.
2.
Uniqueness of the exponent. Because every public value P i ( x ) is derived using the same exponent, the equalities in (7) force a single-value exponent x that is globally compatible with the entire family.
Together, these checks ensure that the prover possesses a concrete solution to the algebraic system
P i ( x ) = A i A i + 1 A n A 1 A i 1 x , i = 1 , , n .
Solving this system corresponds precisely to the Factor Recovery Problem (FRP) and the Powered Product Identification Problem (PPIP), now coupled with the nonlinear autopotency constraints introduced in Section 5.
We emphasize that global consistency verification is appropriate when the tuple ( A 1 , , A n , x ) is an ephemeral secret associated with a single authentication session. Revealing these values is compatible with one-time authentication, initialization, or registration phases, but not with reusable long-term secrets. This design choice reflects a deliberate trade-off between algebraic transparency and bounded reuse, enabling lightweight authentication mechanisms without reliance on long-lived secret material.

2.4. Remarks on MDLP, Conjugacy, and Quantum Algorithms

For completeness, we distinguish two different algebraic problem settings that arise in our framework.
First, whenever a public matrix r G L k ( F p ) is raised to a secret exponent y and we are only given ( r , r y ) , the associated problem lives in the finite cyclic subgroup
r = { I , r , r 2 , , r t 1 } G L k ( F p ) ,
where t = ord ( r ) . Via the isomorphism r Z t , this Matrix Discrete Logarithm Problem (MDLP) reduces to a standard discrete logarithm in a finite abelian group. Classically, no polynomial-time algorithm is known, but from the quantum perspective, Shor’s algorithm solves this type of problem in polynomial-time in log t . Thus, any component of the scheme that relies solely on MDLP is not post-quantum-secure.
Second, and more specific to our proposal, the challenge–response mechanism and the powered products ( P i ( x ) ) i = 1 n give rise to the PPIP and FRP problems in (5) and (6), as well as to the Autopotent Parameter Recovery Problem (APRP) discussed in Section 5. These tasks are naturally phrased as instances of the Conjugacy Search Problem and as structured multivariate systems over F p , rather than as abelian hidden subgroup problems.
In particular, the presence of exponentiation and autopotent constraints prevents a direct reduction of PPIP or FRP to linear intertwiner equations of the form U X = Y U with known coefficients. Instead, the unknown conjugators and matrix parameters appear nonlinearly and are coupled across multiple powered products, precluding straightforward linearization techniques commonly used in matrix conjugacy problems.
The Autopotent Parameter Recovery Problem (APRP) induces systems of coupled multivariate polynomial equations over F p , whose variables correspond to the structured parameters defining the secret matrices (e.g., Toeplitz coefficients and diagonal entries), together with constraints arising from autopotency relations among matrix powers. While we do not claim a formal reduction of APRP to standard Multivariate Quadratic (MQ) problems, the resulting systems share several characteristic features with MQ-type instances encountered in algebraic cryptanalysis: a growing number of variables as the matrix dimension k increases, nonlinear coupling between parameters, and polynomial degrees that grow with the depth of the power expansions. In particular, even for modest values of k, the autopotent constraints generate polynomial relations whose degrees exceed the purely quadratic case, yielding dense and structured systems. As k increases, both the number of unknown parameters and the algebraic degree of the resulting system increase, which is expected to adversely affect the performance of generic algebraic attacks such as Gröbner basis or XL-type methods. Although no formal complexity bounds are claimed, solving such systems is heuristically expected to require computational resources beyond currently known polynomial-time methods, especially when combined with a large underlying field F p . We emphasize that this discussion is intended to clarify the structural nature of APRP and its distinction from abelian discrete-logarithm-type problems, rather than to assert provable hardness. The security assumptions adopted in this work are therefore heuristic and structural in nature.
This distinction is central to the post-quantum-oriented motivation of the present work: while no formal quantum hardness reduction is claimed, the absence of an apparent embedding into abelian hidden subgroup formulations motivates the investigation of these problems as non-standard candidates for post-quantum cryptanalysis.
At present, we are not aware of any classical or quantum algorithms that solve PPIP, FRP, or APRP in polynomial-time for the non-diagonalizable Toeplitz constructions considered here, nor of any reduction that casts them into the abelian hidden subgroup framework underlying Shor’s algorithm. This motivates the following working hypothesis.
Conjecture 1
(Heuristic hardness of the non-diagonalizable conjugacy framework). For suitable choices of p, k, and the family of non-diagonalizable matrices, solving PPIP, FRP, or APRP on generic instances derived from our key generation and challenge procedures requires super-polynomial-time, even for adversaries equipped with a quantum computer.
Our formal security analysis in this paper remains classical: we do not claim a proven post-quantum reduction. Nevertheless, the conjugacy-based structure and the lack of a known reduction to abelian hidden subgroup problems suggest that the framework may be a promising candidate for further post-quantum cryptanalytic investigation.

3. Challenge–Response Authentication Protocol

  • Protocol definition.
The proposed authentication mechanism follows a standard challenge–response paradigm and involves two parties: a prover (Bob) and a verifier (Alice). A single authentication execution proceeds as follows.
Step 1:
Setup (Prover). Bob samples a secret family of matrices A = ( A 1 , , A n ) from the structured set F ( k , p ) defined in Section 4, and selects a secret exponent x. He computes the cyclic products P i and publishes the powered products K pub = ( P 1 ( x ) , , P n ( x ) ) .
Step 2:
Challenge (Verifier). Alice selects an index i { 1 , , n } uniformly at random (or according to a prescribed distribution) and sends i to Bob.
Step 3:
Response (Prover). Upon receiving the challenge index i, Bob reveals the corresponding secret matrix A i .
Step 4:
Verification (Verifier). Alice verifies Bob’s response by checking the conjugacy relation
A i 1 P i ( x ) A i = P σ ( i ) ( x ) ,
where σ denotes the cyclic index shift induced by the product construction. If the verification succeeds and A i satisfies the required structural constraints, Alice accepts; otherwise, she rejects.
For clarity, we now provide a more detailed description of each phase of the protocol as illustrated schematically in Figure 1.
  • Setup (Prover).
Bob generates his long-term secret as follows: we emphasize that this secret may be instantiated per session or refreshed after a bounded number of authentication rounds, depending on the intended deployment model.
  • He samples A = ( A 1 , , A n ) from the structured family F of invertible non-diagonalizable matrices defined in Section 4.
  • He selects a secret exponent x Z , typically chosen uniformly from a large interval modulo the order of the relevant subgroup.
  • He computes the cyclic products P i as in (1) and the corresponding powered products P i ( x ) = P i x as in (3).
  • He publishes the tuple
    K pub = ( P 1 ( x ) , , P n ( x ) ) ,
    and keeps ( A , x ) secret.
  • Challenge.
When Alice wishes to authenticate Bob, she proceeds as follows:
  • She retrieves Bob’s public data K pub .
  • She selects a challenge index i { 1 , , n } at random (or according to a prescribed distribution) and sends i to Bob.
  • Response.
Upon receiving the challenge index i, Bob responds by
  • Revealing the corresponding secret matrix A i .
An external adversary observing the protocol transcript therefore gains access to the challenged index i and the corresponding matrix A i , but not to the remaining factors nor to the exponent x.
  • Verification.
Alice verifies Bob’s response by checking the conjugacy relation
A i 1 P i ( x ) A i = ? P σ ( i ) ( x ) ,
where σ is the rotation mapping induced by the cyclic ordering of the products.
More explicitly, the permutation σ is defined as the cyclic shift σ ( i ) = i + 1 for i < n and σ ( n ) = 1 , corresponding to the ordering of the cyclic products used to define P i .
If (8) holds and A i satisfies the required structural constraints (e.g., belonging to the Toeplitz family), Alice accepts the authentication; otherwise, she rejects. In an implementation, the index 1 in (8) may be replaced by any fixed reference product, as long as the mapping i σ ( i ) is well-defined.

3.1. Correctness and Security Discussion

The following security discussion assumes a standard challenge–response setting, in which an adversary may observe previous protocol executions and attempt to impersonate the legitimate prover, but does not initially know the secret family ( A 1 , , A n ) nor the exponent x.
Correctness follows directly from the construction: since A i 1 P i A i = P σ ( i ) , raising both sides to the power x yields (4), and hence the verification Equation (8) holds for honest Bob.
From a security perspective, an adversary attempting to impersonate Bob faces two basic strategies:
1.
Online guessing: Without prior computation, the adversary can attempt to respond to a challenge index i by outputting a random matrix A ˜ i and hoping that (8) happens to hold. Under mild assumptions on the distribution of the public products, the success probability of such an attempt in a single authentication round is upper bounded by 1 / n , where n denotes the number of secret factors. By repeating the protocol for r-independent rounds, the impersonation success probability is bounded by ( 1 / n ) r .
An adversary who observes multiple authentication sessions and accumulates valid transcript pairs ( i , A i ) does not gain an advantage beyond the number of unrevealed secret factors. Once a factor A i has been disclosed, it is treated as consumed and is not assumed to remain secure for future sessions. Consequently, the above impersonation bound applies with respect to the remaining unrevealed factors, and transcript accumulation does not invalidate the stated success probability estimates.
2.
Offline algebraic attack: The adversary may try to solve an instance of PPIP or FRP, using the public data ( P i ( x ) ) i = 1 n to compute either a valid conjugator U or a set of factors ( A ˜ 1 , , A ˜ n ) in F that satisfy the same cyclic relations. In our instantiation, this task reduces to solving multivariate polynomial systems that encode the Toeplitz and autopotent structure of the underlying matrices and their powers. We assume that no polynomial-time classical algorithms are known to solve such systems for our parameter ranges, beyond generic exponential-time algebraic techniques.
We emphasize that the proposed authentication mechanism is not formulated as a reusable long-term authenticator. The protocol description does not assume indefinite reuse of the same secret family ( A 1 , , A n ) across arbitrarily many sessions. In particular, the intentional revelation of individual matrices A i during authentication is compatible with one-time or bounded-use authentication scenarios. If the same secret family were to be reused across many sessions, repeated revelations of A i could indeed lead to cumulative information leakage. Such long-term reuse scenarios, and the countermeasures they would require, are outside the scope of the present work. In particular, once a factor A i has been revealed during authentication, the corresponding index i should be treated as consumed in subsequent sessions unless the secret family is refreshed.
After at most n successful authentication sessions, all secret factors ( A 1 , , A n ) may have been revealed. At this point, the original secret family provides no further security and must be refreshed. The protocol is therefore inherently bounded-use, with the parameter n directly determining the maximum number of supported authentication sessions.
The protocol is therefore best interpreted as a structurally grounded challenge–response mechanism, whose security relies on explicit algebraic assumptions rather than on standard reduction-based proofs. It does not claim provable security under a standard reduction, nor does it directly compete with established post-quantum authentication mechanisms. Its main contribution is to illustrate how structured non-diagonalizable matrices and their power expansions can be used to define algebraic authentication tasks in noncommutative settings.

3.2. Worked Example (Toy Parameters)

To make the protocol fully explicit and self-contained, we provide a worked example with small parameters. All computations below are performed in F p with modular arithmetic on matrix entries. For this toy example, we focus on the conjugacy verification equation; structural-membership checks (e.g., Toeplitz-parameter validation) are omitted for brevity.
  • Parameters.
We choose p = 101 , k = 2 , n = 3 , and a secret exponent x = 17 . The cyclic permutation is defined by σ ( i ) = i + 1 mod 3 , that is, σ ( 1 ) = 2 , σ ( 2 ) = 3 , and σ ( 3 ) = 1 .
  • Secret matrices.
Let Bob’s secret family be A = ( A 1 , A 2 , A 3 ) G L 2 ( F 101 ) , where
A 1 = 40 87 37 71 , A 2 = 38 53 60 77 , A 3 = 72 1 16 51 .
Each A i is invertible (e.g., det ( A 1 ) = 25 , det ( A 2 ) = 49 , and det ( A 3 ) = 20 in F 101 ). The matrices are noncommutative (for instance, A 1 A 2 A 2 A 1 ), and are chosen from the structured non-diagonalizable family described in Section 4.
  • Cyclic products and public powered products.
For n = 3 , the cyclic products are defined as P 1 = A 1 A 2 A 3 , P 2 = A 2 A 3 A 1 , and P 3 = A 3 A 1 A 2 . A direct computation in F 101 yields
P 1 = 83 90 85 88 , P 2 = 54 5 40 16 , P 3 = 86 36 78 85 .
Bob publishes the public key K pub = ( P 1 ( x ) , P 2 ( x ) , P 3 ( x ) ) . Since x = 17 , we write P i ( x ) = P i ( 17 ) , and obtain
P 1 ( 17 ) = 78 61 52 87 , P 2 ( 17 ) = 46 9 72 18 , P 3 ( 17 ) = 43 85 100 21 .
  • One authentication round.
Suppose Alice challenges Bob with index i = 1 . Bob reveals A 1 . Alice verifies the relation
A 1 1 P 1 ( 17 ) A 1 = ? P σ ( 1 ) ( 17 ) = P 2 ( 17 ) .
A direct computation in F 101 yields
A 1 1 P 1 ( 17 ) A 1 = 46 9 72 18 = P 2 ( 17 ) ,
so Alice accepts. Analogously, one verifies that A 2 1 P 2 ( 17 ) A 2 = P 3 ( 17 ) and A 3 1 P 3 ( 17 ) A 3 = P 1 ( 17 ) .
This toy example is included solely to illustrate the mechanics of the protocol and the verification relation, and is not intended to suggest security for these small parameter choices.

3.3. Permutation-Coded Authenticated Message Space

The challenge–response protocol in Section 3 allows a verifier (Alice) to check the validity of individual authenticators A i by means of the conjugacy relation (8). As a direct consequence, the same infrastructure can be used to transmit authenticated messages by encoding information in the order in which the authenticators are revealed. As in the base authentication protocol, this construction is intended for scenarios where the underlying authenticators are used in a bounded or one-time manner, such as initialization, bootstrapping, or session-bound authenticated exchanges.
  • Message space and encoding.
Let n 2 be the length of the secret family A = ( A 1 , , A n ) held by Bob, and let S n denote the symmetric group on { 1 , , n } . We consider a finite message space M and a non-empty set of admissible permutations
S S n ,
together with an injective encoding map
Enc : M S .
The pair ( M , Enc ) is fixed in advance and known to both parties. Given a permutation π S , we write π = ( π ( 1 ) , , π ( n ) ) in one-line notation, so that π ( t ) { 1 , , n } is the index of the authenticator sent in position t.
If S = S n and Enc is the identity, the message space has cardinality
| M | = | S n | = n ! ,
so that each possible permutation of the authenticators corresponds to a distinct message. More generally, by choosing S as a proper subset of S n (e.g., to impose additional structure, distance, or robustness constraints), one obtains a reduced but still large message space | M | = | S | .
  • Permutation-coded transmission.
Assume that the setup phase of Section 3 has been completed: Bob holds the secret family A and exponent x; Alice knows the public powered products K pub = ( P 1 ( x ) , , P n ( x ) ) and the rotation σ induced by the cyclic construction of the products.
To send a message m M , Bob and Alice proceed as follows.
1.
Encoding (Bob). Bob computes the permutation π = Enc ( m ) S .
2.
Transmission (Bob → Alice). Over an order-preserving channel, Bob sends the sequence of authenticators
A π ( 1 ) , A π ( 2 ) , , A π ( n ) .
No challenge indices are issued by Alice in this variant; the entire permutation is chosen and initiated by Bob.
3.
Global verification (Alice). After receiving the full sequence, Alice performs the following checks:
(a)
For each position t { 1 , , n } , she verifies that the conjugacy relation
A π ( t ) 1 P π ( t ) ( x ) A π ( t ) = ? P σ ( π ( t ) ) ( x )
holds and that A π ( t ) satisfies the required structural constraints (e.g., membership in the Toeplitz family).
(b)
She reconstructs the permutation π from the ordered list of valid indices and checks that π S .
If any of these checks fails, she rejects the transmission.
4.
Decoding (Alice). If all checks succeed, Alice computes
m Dec ( π ) ,
where Dec is the inverse of Enc on its image S . She accepts m as an authenticated message from Bob.
  • Correctness and message space.
For an honest prover Bob, the correctness of the original challenge–response verification (8) implies that step 3(a) always succeeds for the true family ( A 1 , , A n ) and the corresponding public products. Since π = Enc ( m ) S by construction, step 3(b) also succeeds, and Alice recovers the intended message m in step 4.
From an adversarial standpoint, producing a new authenticated message amounts to generating a full sequence of matrices ( A ˜ π ( 1 ) , , A ˜ π ( n ) ) that simultaneously (i) satisfies all conjugacy checks in step 3(a), and (ii) corresponds to a permutation π S under the agreed encoding. This requires solving a non-trivial instance of the powered product and factor recovery problems (PPIP/FRPs) together with the structural constraints imposed on the family A, and hence inherits the heuristic hardness assumptions discussed in Section 2.
In summary, the challenge–response protocol gives rise, as a corollary, to a permutation-coded authenticated message channel with message space of size | M | = | S | , which can be as large as n ! when all permutations are admissible.
In this sense, message authentication and identity authentication are unified under the same noncommutative algebraic hardness assumptions.

4. Construction of Non-Diagonalizable Matrices in F p k × k

The resilience of the proposed protocol against spectral decomposition and linearization attacks critically depends on the use of matrices whose structure resists simplification via diagonalization [22]. A matrix M F p k × k is considered diagonalizable over the field if it is similar to a diagonal matrix D, meaning there exists an invertible matrix P such that M = P D P 1 [23]. This transformation is possible if and only if the algebraic multiplicity of each eigenvalue—the number of times it appears as a root of the characteristic polynomial—equals its geometric multiplicity—the dimension of its corresponding eigenspace, dim ( ker ( M λ I ) ) .
Conversely, a matrix is non-diagonalizable (or defective) when at least one eigenvalue has a geometric multiplicity strictly less than its algebraic multiplicity. This defectiveness typically arises from the presence of non-trivial Jordan blocks in the Jordan canonical form of the matrix, which occur when the matrix lacks a full set of linearly independent eigenvectors. In the context of our algebraic framework, employing non-diagonalizable matrices in the construction of the secret factors A i and of the derived products P i is a deliberate countermeasure: it hinders an adversary from simplifying the underlying problems by transforming the public matrices into a diagonal form, which would otherwise decompose their action into a set of independent and potentially easier scalar problems within the multiplicative group of the field F p .
Throughout the manuscript, we denote by F = F ( k , p ) the structured family of invertible, non-diagonalizable matrices in F p k × k that are constructed according to the method described in this section. Elements of F are obtained as products of structured factors, including diagonal and upper triangular Toeplitz components, chosen so as to enforce non-diagonalizability and to satisfy the algebraic constraints required by the protocol. The family F is therefore not an arbitrary subset of G L k ( F p ) , but a restricted class of matrices whose parameters give rise to coupled algebraic relations under conjugation and exponentiation.
To systematically generate such matrices, we propose a constructive method that guarantees non-diagonalizability for a specified matrix size k. The core idea is to engineer the matrix products to have a controlled eigenvalue structure that inherently leads to a deficient eigenspace. We achieve this by defining one factor, z , as a diagonal matrix with distinct, non-zero entries, ensuring it is itself diagonalizable and invertible. The other factor, w , is constructed as an invertible upper triangular matrix, whose scalar parameters (denoted by t) are chosen independently of those of z , and which is specifically designed to lack a single, common eigenvector basis with z . The key insight is that the product M = z w will inherit a triangular structure from w , but its eigenvector structure is disrupted by the distinct scaling imposed by z , often resulting in a single, repeated eigenvalue with an insufficient number of associated eigenvectors.
The subsequent subsections detail this construction for the fundamental case of k = 2 , providing a clear blueprint for generating noncommutative, non-diagonalizable pairs ( z , w ) whose product M = z w can be used as a building block for the secret factors A i appearing in the cyclic products P i of Section 3. This method can be generalized to larger dimensions by working with block matrix extensions or by ensuring that a single Jordan block of maximal size governs the matrix structure.

4.1. Method Overview

The systematic construction of a non-diagonalizable matrix M = z w F p k × k for cryptographic use requires carefully selecting the constituent matrices to engineer a specific spectral structure. For clarity and foundational understanding, we first present the construction for the minimal dimension k = 2 , which captures the essential principles and can be generalized to higher dimensions.
Let z be an invertible diagonal matrix with distinct, non-zero entries. This choice ensures z is itself diagonalizable and contributes distinct scaling factors to the rows of w . For instance,
z = α 0 0 β , α β , α , β F p * .
Let w be an invertible upper triangular matrix. This structure is pivotal as it constrains the eigenvectors of the resulting product. A general form is
w = x y 0 t , x , t , y F p , x , t 0 .
The product M = z w is then computed as
M = α 0 0 β x y 0 t = α x α y 0 β t .
This product M is an upper triangular matrix. For M to be non-diagonalizable over F p , two conditions must be simultaneously satisfied:
1.
Repeated Eigenvalue: The eigenvalues of M, which are its diagonal entries α x and β t , must be equal. This gives the condition
α x β t ( mod p ) .
This ensures the characteristic polynomial det ( M λ I ) = ( λ α x ) 2 has a single root of algebraic multiplicity 2.
2.
Deficient Eigenspace: The matrix must not have two linearly independent eigenvectors. For an upper triangular matrix with a repeated eigenvalue λ ; this occurs if and only if it is not a scalar multiple of the identity, i.e., the superdiagonal entry is non-zero:
α y 0 ( mod p ) .
Under this condition, the matrix M λ I has rank 1, implying its kernel (the eigenspace for λ ) is one-dimensional. Thus, the geometric multiplicity (1) is strictly less than the algebraic multiplicity (2), confirming non-diagonalizability.
To procedurally generate such a matrix M, one can
1.
Randomly select distinct non-zero values α , β F p * ;
2.
Randomly choose x , y F p * (ensuring α y 0 is satisfied);
3.
Compute t from the repeated eigenvalue condition: t α x β 1 ( mod p ) .
This algorithm efficiently yields a non-diagonalizable matrix M suitable as a core factor in the families of secret matrices employed by the protocol.

4.2. Example

Consider the finite field F 11 Z 11 . We follow the construction method to build a non-diagonalizable matrix.
  • Let the diagonal matrix be z = 3 0 0 5 . We have α = 3 , β = 5 .
  • Choose x = 5 and y = 2 . This satisfies α y = 3 · 2 = 6 0 ( mod 11 ) .
  • Compute t to enforce a repeated eigenvalue:
    t α x β 1 ( 3 · 5 ) · 5 1 ( mod 11 ) .
    Since 5 1 9 ( mod 11 ) (as 5 · 9 = 45 1 ), we have
    t 15 · 9 4 · 9 36 3 ( mod 11 ) .
    Thus, w = 5 2 0 3 .
The resulting product is
M = z w = 3 0 0 5 5 2 0 3 = 15 6 0 15 4 6 0 4 ( mod 11 ) .
The matrix M has a single eigenvalue λ = 4 with algebraic multiplicity 2. To find the geometric multiplicity, we examine the eigenspace
M 4 I = 0 6 0 0 .
The rank of M 4 I is 1 (since the second row is zero, but the first row is non-zero), confirming that the kernel is one-dimensional. Therefore, the geometric multiplicity is 1, which is less than the algebraic multiplicity of 2, proving that M is non-diagonalizable over F 11 .
Finally, note that z w w z , as
w z = 5 2 0 3 3 0 0 5 = 15 10 0 15 4 10 0 4 ( mod 11 ) ,
which differs from M. This noncommutativity is essential for the conjugacy relationships that underpin the challenge–response protocol, where products of such matrices appear as the secret factors and their cyclic combinations.

5. Autopotencies of Upper Triangular Toeplitz Matrices

A critical aspect of the proposed framework lies in the properties of matrix exponentiation. The public data in the protocol, as well as several internal verification steps, are fundamentally composed of matrices raised to secret powers, typically of the form M n , where M is a structured, non-diagonalizable matrix and n is a large, secret integer. The algebraic strength of the construction hinges on the apparent computational infeasibility of deriving these secret exponents or the constituent parameters of M from their exponentiated products, a challenge that naturally leads to parameter recovery and factor recovery problems.
To rigorously assess the resilience of these transformations against algebraic cryptanalysis, a deep understanding of the structural evolution of matrices under exponentiation is paramount. It is necessary to characterize the precise algebraic relationships that emerge between the entries of a matrix M and its power M n . Specifically, we seek to identify which structural invariants are preserved and what new deterministic patterns arise, as these could potentially be exploited by an adversary to simplify the underlying hard problems.
In this work, we impose a specific structure on the matrix factor w to facilitate this analysis while maintaining security; we model it as an upper triangular Toeplitz matrix. A Toeplitz matrix is constant along its diagonals, and an upper triangular one has the following general form for size k × k :
w = λ a 1 a 2 a k 1 0 λ a 1 a k 2 0 0 λ a k 3 0 0 0 λ .
This structure is particularly advantageous because it allows for the derivation of closed-form expressions for the entries of any power w n . These expressions reveal that the entries on the t-th superdiagonal of w n are not independent but are governed by a deterministic function of the base coefficients a 1 , , a t , the eigenvalue λ , and the exponent n.
We formalize these intrinsic dependencies through a concept we term autopotency. An autopotency identity is a precise algebraic relation that binds the entries of a matrix power M n to the original parameters of M and the exponent n. For a legitimate user in possession of the private parameters (the coefficients a t and the exponent n), these identities serve as efficient verification tools, enabling them to confirm the correctness of computed powers or protocol messages without re-performing the full exponentiation.
Conversely, for an adversary who only observes the public matrix M n , these same identities present a formidable barrier. The autopotency relations constitute a system of multivariate polynomial equations over the finite field F p . Isolating the secret parameters from this system is equivalent to solving a complex, nonlinear decomposition problem that appears intractable for large matrix dimensions and field sizes, thereby underpinning the security of the exponentiation process against parameter recovery attacks. The following subsections derive these autopotency identities explicitly for the general case and for small values of k.
In other words, the autopotency property serves a dual purpose:
1.
It provides structural predictability necessary for efficient verification and protocol checks by honest parties.
2.
It ensures cryptographic opacity, since isolating the private parameters from the observable entries of M n involves solving nonlinear systems over F p , which in general leads to multivariate polynomial systems with a structure similar to multivariate quadratic (MQ) problems, for which only generic exponential-time algebraic techniques (such as Gröbner bases or XL-type methods) are currently known.
The following subsections derive explicit expressions for these powers and the corresponding autopotency relations, beginning with the general case and illustrating particular instances for k = 2 and k = 3 .

5.1. General Form of the Matrix M

To harness the analytical advantages of the Toeplitz structure, we formally define the matrix w (or a relevant block thereof) as an upper triangular Toeplitz matrix M of size k × k . This matrix can be elegantly decomposed using a basis of nilpotent matrices. Let I be the k × k identity matrix, and let N be the nilpotent shift matrix defined by
N = 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 ,
which satisfies the nilpotency condition N k = 0 . The matrix N t has 1’s on the t-th superdiagonal and zeros elsewhere, for 1 t < k .
Any upper triangular Toeplitz matrix M can be expressed as a polynomial in N:
M = λ I + a 1 N + a 2 N 2 + + a k 1 N k 1 ,
where λ , a 1 , , a k 1 F p . The scalar λ 0 ensures the matrix is invertible. In this formulation, λ appears on the main diagonal, the coefficient a 1 defines the first superdiagonal, a 2 the second, and so forth. This representation is powerful because it reduces matrix multiplication and exponentiation to operations on the coefficients within the polynomial ring F p [ N ] , subject to the relation N k = 0 .

5.2. Computing M n

The computation of M n is central to the cryptographic operations. Leveraging the binomial theorem within the commutative algebra generated by λ I and the nilpotent matrix A = a 1 N + + a k 1 N k 1 , we obtain a finite expansion:
M n = ( λ I + A ) n = r = 0 k 1 n r λ n r A r ,
where the series terminates at r = k 1 due to the nilpotency of A. The entry on the t-th superdiagonal of M n , denoted L t , is determined by the terms where the combined power of N in A r equals t. This yields the explicit formula
L t = r = 1 t n r λ n r j 1 + + j r = t j ν 1 a j 1 a j 2 a j r , for t = 1 , , k 1 .
The diagonal entries are simply L 0 = λ n . This expression reveals that L t is a polynomial in the base coefficients a 1 , , a t and the exponent n.
We can isolate the leading term of this polynomial, which is linear in a t , by defining the adjusted entry  L t * :
L t * = n λ n 1 a t .
This definition allows us to establish the core autopotency identity. Observing that L 0 = λ n , a simple manipulation shows that for any t 1 ,
L 0 L t * · a t · n = λ .
Raising both sides to the power n confirms the identity
L 0 L t * · a t · n n = λ n = L 0 .
This identity is a powerful tool for a legitimate user who knows the private parameters a t and n. They can compute L t * directly and efficiently verify the consistency of a computed power M n by checking if the identity holds.
For an adversary, however, exploiting this identity is computationally infeasible. While the public matrix M n reveals L 0 and the full L t , the adjusted entry L t * is not directly observable; it is masked within the complete expression for L t , which includes higher-order terms involving products of the coefficients a 1 , , a t 1 . For example, for the third superdiagonal ( t = 3 ), the full expression is
L 3 = n λ n 1 a 3 + n ( n 1 ) 2 λ n 2 a 1 a 2 + n ( n 1 ) ( n 2 ) 6 λ n 3 a 1 3 .
An adversary faces a system of such multivariate polynomial equations for the different superdiagonals. Isolating the secret parameters a t and n from this system is equivalent to solving a structured decomposition problem. Guessing the exponent n alone is infeasible due to the search space size of O ( p ) . Furthermore, even with a hypothesized n, extracting the coefficients a t requires solving a system of nonlinear equations over F p with a structure that resembles generic multivariate quadratic (MQ) problems. We refer to this task as the Autopotent Parameter Recovery Problem (APRP). Although we do not provide a reduction from APRP to any standard MQ-hardness assumption, we are not aware of polynomial-time classical algorithms that solve such systems in general, beyond generic exponential-time algebraic techniques (e.g., Gröbner bases or XL-type methods).
This analysis confirms that the autopotency property, while enabling efficient verification for legitimate users, simultaneously creates a cryptographic barrier that helps protect the secrecy of the exponent and the base matrix parameters against algebraic parameter recovery attacks.

5.3. Base Case: k = 2

The case k = 2 provides the most elementary yet insightful illustration of the autopotency principle. Consider the upper triangular Toeplitz matrix:
M = λ a 1 0 λ = λ I + a 1 N , where N = 0 1 0 0 .
The nilpotency condition is N 2 = 0 , which drastically simplifies the binomial expansion for M n . The computation yields a closed form:
M n = ( λ I + a 1 N ) n = λ n I + n λ n 1 a 1 N = λ n n λ n 1 a 1 0 λ n .
Here, the diagonal entry is L 1 = λ n , and the first superdiagonal entry is L 2 = n λ n 1 a 1 . In this simple case, the adjusted entry is identical to the observable superdiagonal, L 2 * = L 2 , as there are no higher-order terms. The autopotency identity manifests clearly:
L 1 L 2 * · a 1 · n = λ n n λ n 1 a 1 · a 1 · n = λ .
Raising both sides to the power n confirms that λ n = L 1 . For a legitimate user, this serves as a trivial yet perfect verification. For an adversary, the security in this 2 × 2 case rests primarily on the hardness of recovering n from L 1 = λ n , given λ , and on the difficulty of determining a 1 without knowledge of n.

5.4. Case k = 3

The three-dimensional case, k = 3 , reveals the full interplay of terms that characterizes the general autopotency concept. The matrix is defined as
M = λ a 1 a 2 0 λ a 1 0 0 λ = λ I + a 1 N + a 2 N 2 ,
with the nilpotent shift matrix N satisfying N 3 = 0 . The power M n requires expanding up to the second power of A = a 1 N + a 2 N 2 :
M n = ( λ I + A ) n = λ n I + n λ n 1 A + n 2 λ n 2 A 2 .
Calculating A 2 = ( a 1 N + a 2 N 2 ) 2 = a 1 2 N 2 (since N 3 = 0 and N 4 = 0 ), we obtain the full power:
M n = λ n I + n λ n 1 a 1 N + n λ n 1 a 2 + n ( n 1 ) 2 λ n 2 a 1 2 N 2 .
Extracting the entries from this expansion gives
L 1 = λ n ( main diagonal ) , L 2 = n λ n 1 a 1 ( first superdiagonal ) , L 3 = n λ n 1 a 2 + n ( n 1 ) 2 λ n 2 a 1 2 ( second superdiagonal ) .
The adjusted entry for the second superdiagonal is defined as L 3 * = n λ n 1 a 2 , which represents the component of L 3 that is linear in a 2 . The autopotency identity for t = 3 is then verified as
L 1 L 3 * · a 2 · n = λ n n λ n 1 a 2 · a 2 · n = λ , and thus λ n = L 1 .
This case provides a concrete illustration of the core cryptographic mechanism. A legitimate user who knows a 1 , a 2 , and n can compute L 3 * and use the identity for verification. An adversary, however, faces the fundamental obstacle that the publicly observable value is L 3 , not L 3 * . To isolate L 3 * , the adversary must somehow subtract the term n ( n 1 ) 2 λ n 2 a 1 2 , which requires knowledge of the very secrets n and a 1 they are trying to determine. This creates a circular dependency and a nonlinear system of equations that underpins the security for larger matrix sizes and links APRP naturally to the broader factor recovery and powered product problems discussed in Section 2.
From a cryptanalytic standpoint, the autopotency identities imply that any attacker who attempts to recover the secret parameters must simultaneously satisfy both the conjugacy constraints among the powered products (as in PPIP/FRP) and the multivariate polynomial relations induced by the Toeplitz structure (as in APRP). This coupling places the problem at the intersection of Conjugacy Search in non-abelian matrix groups and MQ-type algebraic cryptanalysis, for which no efficient classical or quantum algorithms are currently known in the general case.

6. Parameter Size and Storage Requirements

  • Methodological overview.
The methodology followed in this work is constructive and exploratory. We first design a controlled algebraic construction of invertible, non-diagonalizable matrices over finite fields, ensuring explicit structural properties that resist diagonalization-based simplifications. These constructions are then embedded into a cyclic challenge–response protocol whose correctness follows directly from conjugacy relations. Next, we abstract the adversarial task into well-defined algebraic problems (PPIP, FRP, and APRP) that capture the difficulty of recovering conjugators or structured parameters from powered matrix products. The hardness of these problems is discussed heuristically by analyzing their algebraic structure, the induced multivariate relations, and their separation from classical abelian discrete-logarithm settings. Finally, we complement the theoretical development with explicit worked examples and basic experimental measurements to demonstrate feasibility and internal consistency, without claiming concrete cryptographic security levels. The present section places these constructions into a practical context by discussing parameter selection, efficiency, and storage requirements.
In the present work, the matrix dimensions k = 2 and k = 3 are used as concrete construction parameters to illustrate the proposed algebraic framework and to enable explicit experimentation. In particular, the case k = 2 is intended primarily for pedagogical and illustrative purposes, as it allows closed-form expressions and compact examples, but it should not be regarded as a recommended choice for security-oriented deployments. From a practical standpoint, k = 3 represents a reasonable baseline that preserves computational feasibility while inducing a substantially richer algebraic structure. Increasing the matrix dimension k enlarges the number of underlying parameters and the complexity of the resulting algebraic relations, which is expected to make generic algebraic recovery attacks more difficult. However, this increase also incurs a non-negligible efficiency cost, since matrix multiplication and exponentiation scale roughly as O ( k 3 log x ) , while storage and communication costs scale as O ( k 2 log p ) . For this reason, rather than relying on large matrix dimensions, the intended hardness of the construction is primarily supported by the use of a sufficiently large finite field F p , together with a suitably chosen exponent x, and by the structured nonlinearity induced by the Toeplitz and autopotent constraints. Indicative parameter choices reflecting these design considerations are summarized in Table 1, which distinguishes between illustrative settings and practical bounded-use deployments.
The algebraic framework proposed in this work is designed to be flexible with respect to concrete parameter choices. Nevertheless, it is useful to outline the asymptotic size of the main objects involved in the challenge–response setting.
We work over a finite field F p with a cryptographically large prime p, and we consider matrices of size k × k . The secret state held by a prover consists of
  • A family of n invertible, non-diagonalizable matrices A 1 , , A n F p k × k , often constructed from diagonal and upper triangular Toeplitz factors as in Section 4;
  • A secret exponent x { 1 , , p 1 } used to form the powered products P i ( x ) = A i A i + 1 A n A 1 A i 1 x .
In the most direct representation, each matrix A i is stored as k 2 field elements, so the secret family requires n k 2 elements of F p , plus one additional element for the exponent x. When the construction of Section 4 is used, the effective number of parameters per factor can be reduced (e.g., to the diagonal entries of z and the Toeplitz parameters of w ), but for simplicity we can regard the storage cost as O ( n k 2 log p ) bits.
The public information published by the prover in one authentication instance consists of the n powered products P 1 ( x ) , , P n ( x ) , each of which is a k × k matrix over F p . This yields a transcript of size O ( n k 2 log p ) bits. If multiple authentication rounds are executed with fresh exponents or modified families of factors, the storage and transmission costs scale linearly in the number of rounds.
These order-of-magnitude estimates show that, for moderate values of k and values of n appropriate to the intended deployment model, the storage and communication requirements remain practical and are dominated by the bit-length of the underlying prime p. A detailed optimization of parameter choices and encoding strategies is left as future work, since the main focus of the present paper is the algebraic structure and the associated hardness assumptions.
When the authentication mechanism is deployed in a bounded-use or single-use factor setting, the parameter n primarily determines the available budget of factor revelations before secret renewal is required. In such scenarios, n is not constrained by algebraic considerations, but by storage and communication requirements. Consequently, while small values of n suffice for illustrative and experimental purposes, larger values (for example, n in the range 10 2 10 3 ) may be adopted in practical deployments to support many authentication sessions, in a manner analogous to one-time-password pools.

7. Experimental Results

We carried out an experimental evaluation of the proposed non-diagonalizable matrix framework in order to quantify the practical cost of the core operations used in our challenge–response setting: generation of suitable matrix factors, construction of non-diagonalizable products, and exponentiation of these matrices over finite fields of different sizes. We emphasize that these experiments are intended to characterize the computational cost and practical feasibility of the underlying algebraic operations, rather than to establish concrete security levels or to validate the cryptographic hardness assumptions discussed elsewhere in the paper.
All experiments were executed on the Cocalc online environment, using a laptop with a 13th Gen Intel(R) Core(TM) i5-1335U (1.30 GHz) processor, 16.0 GB RAM, and a 64-bit operating system. Each test configuration was repeated 20 times, and both average values and statistical variations were recorded.

Performance of the Matrix-Based Primitive

As summarized in Table 2, the implementation achieved a 100% success rate for all tested prime sizes (128, 256, 512, and 1024 bits), confirming the correctness and numerical stability of the construction and exponentiation procedures. The average number of matrix generation attempts was one per execution, which indicates that the non-diagonalizability conditions can be satisfied efficiently by the algorithm of Section 4. This observation pertains solely to the reliability of the construction process and does not carry security implications.
Execution times show a clear dependency on the prime size, with total computation time increasing from 0.012 s for 128-bit primes to 1.94 s for 1024-bit primes (see Table 3 and Figure 2). This growth trend is consistent with the expected complexity of matrix exponentiation over F p . The most time-consuming phase corresponds to prime and matrix generation, accounting for up to 97% of total time at 1024 bits (see Table 4).
Energy consumption follows the same increasing pattern as execution time, rising from 0.28 J for 128-bit to 45.32 J for 1024-bit parameters. The observed behavior is compatible with an approximately quadratic dependence on the bit-length of the prime, in line with the cost of arithmetic in F p . Despite this growth, the results demonstrate that the primitive remains computationally feasible for lower and intermediate parameter ranges (128–512 bits), where it achieves practical performance on general-purpose hardware.
The scalability analysis in Table 3 and Figure 3 illustrates the trade-off between throughput and energy efficiency. Both metrics decrease significantly with increasing prime size, highlighting the challenge of scaling the primitive to very high security levels without further implementation optimizations. Here, the term “security level” is used to denote larger algebraic parameter sizes, not a formally established cryptographic security classification. Within the 128–256 bit range, however, total execution times remain below 0.1 s, which suggests that the proposed matrix-based operations can be implemented with acceptable cost under a classical security viewpoint.
Overall, these results indicate that the proposed non-diagonalizable matrix constructions can be instantiated and evaluated efficiently for moderate parameter sizes, supporting their use as a testbed for further algebraic and cryptanalytic investigation.

8. Conclusions

This work has introduced an algebraic framework for constructing challenge–response authentication mechanisms based on powers of non-diagonalizable matrices over finite fields. The core ingredients are (i) a controlled method for generating invertible, non-diagonalizable matrices via products of diagonal and upper triangular factors; (ii) the use of autopotent upper triangular Toeplitz matrices, whose structured power expansions induce nonlinear relations between matrix parameters and exponents; and (iii) a cyclic family of powered products that yields matrix instances of the classical Conjugacy Search Problem.
Within this framework, we formulated three heuristic hardness assumptions: the Powered Product Identification Problem (PPIP) and the Factor Recovery Problem (FRP), which capture the difficulty of recovering valid conjugators or individual factors from powered products; and the Autopotent Parameter Recovery Problem (APRP), modeled as a structured multivariate system over F p . The Toeplitz–triangular representation allowed us to derive closed-form expressions for matrix powers and to identify autopotency identities that legitimate users can exploit for efficient verification, while any adversary must satisfy coupled conjugacy constraints and multivariate polynomial relations. At present, we are not aware of classical or quantum algorithms that solve PPIP, FRP, or APRP in polynomial-time for the constructions considered here, nor of reductions that place them within the abelian hidden subgroup framework underlying Shor’s algorithm; this motivates the explicit conjecture stated in the paper, while keeping our security claims heuristic and explicitly confined to the classical setting. At the same time, the structural separation from abelian hidden subgroup formulations provides a natural motivation for further post-quantum-oriented cryptanalytic investigation.
Rather than asserting post-quantum security, the present work highlights algebraic features—such as non-diagonalizability, enforced conjugacy relations, and structured parameter coupling—that currently prevent a straightforward embedding of the proposed problems into known quantum algorithmic paradigms. This perspective is intended to motivate continued exploration of such noncommutative constructions in the context of post-quantum cryptography, without overstating the current state of knowledge.
The experimental evaluation for prime sizes between 128 and 1024 bits confirms the practical feasibility of the underlying matrix operations on general-purpose hardware, with execution time and energy consumption growing with the bit-length of the prime in line with the cost of arithmetic and matrix exponentiation over F p . For smaller parameter ranges, the performance remains within practical bounds. These observations support the practical implementability of the proposed algebraic constructions, without implying concrete cryptographic security levels.
Overall, the main contribution of this work is a structured algebraic toolkit—non-diagonalizable matrix constructions, Toeplitz autopotency, and cyclic powered products—and the demonstration of how these tools can be assembled into a concrete authentication mechanism. The framework is not proposed as a drop-in replacement for standardized primitives, but as a structurally grounded contribution to the broader investigation of matrix-based cryptography. Future work includes a more detailed cryptanalytic study of the proposed hardness assumptions, the design of protocol variants with richer challenge structures, and the investigation of implementations in other environments and languages, as well as potential applications to pseudorandom matrix transformations, coding-theoretic schemes, and network coding over finite fields. In this sense, the work aims to broaden the design space of algebraic cryptographic constructions by highlighting the role of non-diagonalizability and structured conjugacy as viable organizing principles in the post-quantum era.

Author Contributions

Conceptualization, D.A.-N. and L.A.L.-P.; methodology, D.A.-N. and L.A.L.-P.; formal analysis, D.A.-N. and L.A.L.-P.; writing—original draft preparation, D.A.-N. and L.A.L.-P.; writing—review and editing, L.A.L.-P. and F.A.J.-G.; supervision, L.A.L.-P. and F.A.J.-G.; All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Chen, L.; Chen, L.; Jordan, S.; Liu, Y.K.; Moody, D.; Peralta, R.; Perlner, R.A.; Smith-Tone, D. Report on Post-Quantum Cryptography; US Department of Commerce, National Institute of Standards and Technology: Washington, DC, USA, 2016; Volume 12.
  2. Dam, D.; Tran, T.; Hoang, V.; Pham, C.; Hoang, T. A survey of post-quantum cryptography: Start of a new race. Cryptography 2023, 7, 40. [Google Scholar] [CrossRef]
  3. Shor, P.W. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994; pp. 124–134. [Google Scholar]
  4. Alagic, G.; Alagic, G.; Apon, D.; Cooper, D.; Dang, Q.; Dang, T.; Kelsey, J.; Lichtinger, J.; Liu, Y.K.; Miller, C.; et al. Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2022. [Google Scholar]
  5. Widodo, A.M.; Pappachan, P.; Sekti, B.A.; Anwar, N.; Widayanti, R.; Rahaman, M.; Bansal, R. Quantum-resistant cryptography. In Innovations in Modern Cryptography; IGI Global: Hershey, PA, USA, 2024; pp. 100–130. [Google Scholar]
  6. Bernstein, D.J. Post-quantum cryptography. In Encyclopedia of Cryptography, Security and Privacy; Springer: Berlin/Heidelberg, Germany, 2025; pp. 1846–1847. [Google Scholar]
  7. Bos, J.; Ducas, L.; Kiltz, E.; Lepoint, T.; Lyubashevsky, V.; Schanck, J.M.; Schwabe, P.; Seiler, G.; Stehlé, D. CRYSTALS-Kyber: A CCA-secure module-lattice-based KEM. In Proceedings of the 2018 IEEE European Symposium on Security and Privacy (EuroS&P), London, UK, 24–26 April 2018; pp. 353–367. [Google Scholar]
  8. Avanzi, R.; Bos, J.; Ducas, L.; Kiltz, E.; Lepoint, T.; Lyubashevsky, V.; Schanck, J.M.; Schwabe, P.; Seiler, G.; Stehlé, D.; et al. CRYSTALS-Kyber algorithm specifications and supporting documentation. NIST PQC Round 2019, 2, 1–43. [Google Scholar]
  9. Ducas, L.; Kiltz, E.; Lepoint, T.; Lyubashevsky, V.; Schwabe, P.; Seiler, G.; Stehlé, D. Crystals-dilithium: A lattice-based digital signature scheme. Iacr Trans. Cryptogr. Hardw. Embed. Syst. 2018, 2018, 238–268. [Google Scholar] [CrossRef]
  10. Soni, D.; Basu, K.; Nabeel, M.; Aaraj, N.; Manzano, M.; Karri, R. Crystals-dilithium. In Hardware Architectures for Post-Quantum Digital Signature Schemes; Springer: Berlin/Heidelberg, Germany, 2020; pp. 13–30. [Google Scholar]
  11. Aumasson, J.P.; Bernstein, D.J.; Beullens, W.; Dobraunig, C.; Eichlseder, M.; Fluhrer, S.; Gazdag, S.L.; Hülsing, A.; Kampanakis, P.; Kölbl, S.; et al. SPHINCS+–Submission to the NIST Post-Quantum Project. 2019. Available online: https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/documents/round-2/submissions/SPHINCS-Round2.zip (accessed on 21 December 2025).
  12. Alagic, G.; Bros, M.; Ciadoux, P.; Cooper, D.; Dang, Q.; Dang, T.; Kelsey, J.; Lichtinger, J.; Liu, Y.K.; Miller, C.; et al. Status Report on the Fourth Round of the Nist Post-Quantum Cryptography Standardization Process; US Department of Commerce, National Institute of Standards and Technology: Washington, DC, USA, 2025.
  13. Bernstein, D.J.; Chou, T.; Lange, T.; von Maurich, I.; Misoczki, R.; Niederhagen, R.; Persichetti, E.; Peters, C.; Schwabe, P.; Sendrier, N.; et al. Classic McEliece: Conservative code-based cryptography. NIST Submissions 2017, 1, 1–25. [Google Scholar]
  14. Matsumoto, T.; Imai, H. Public quadratic polynomial-tuples for efficient signature-verification and message-encryption. In Proceedings of the Advances in Cryptology—EUROCRYPT’88: Workshop on the Theory and Application of Cryptographic Techniques, Davos, Switzerland, 25–27 May 1988; Proceedings 7. Springer: Berlin/Heidelberg, Germany, 1988; pp. 419–453. [Google Scholar]
  15. Ding, J.; Schmidt, D. Rainbow, a new multivariable polynomial signature scheme. In Proceedings of the International Conference on Applied Cryptography and Network Security, New York, NY, USA, 7–10 June 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 164–175. [Google Scholar]
  16. Lizama-Pérez, L.A. A Matrix Multiplication Approach to Quantum-Safe Cryptographic Systems. Cryptography 2024, 8, 56. [Google Scholar] [CrossRef]
  17. Menezes, A. The discrete logarithm problem. In Elliptic Curve Public Key Cryptosystems; Springer: Berlin/Heidelberg, Germany, 1993; pp. 49–59. [Google Scholar]
  18. Myasnikov, A.G.; Shpilrain, V.; Ushakov, A. Non-Commutative Cryptography and Complexity of Group-Theoretic Problems; Number 177; American Mathematical Society: Providence, RI, USA, 2011. [Google Scholar]
  19. Lamport, L. Password authentication with insecure communication. Commun. ACM 1981, 24, 770–772. [Google Scholar] [CrossRef]
  20. Haller, N.; Metz, C.; Nesser, P.; Straw, M. A One-Time Password System. Technical Report. 1998. Available online: https://www.rfc-editor.org/rfc/rfc2289.html (accessed on 21 December 2025).
  21. Ko, K.H.; Lee, S.J.; Cheon, J.H.; Han, J.W.; Kang, J.S.; Park, C. New public-key cryptosystem using braid groups. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 20–24 August 2000; Springer: Berlin/Heidelberg, Germany, 2000; pp. 166–183. [Google Scholar]
  22. Horn, R.A.; Johnson, C.R. Matrix Analysis; Cambridge University Press: Cambridge, UK, 2012. [Google Scholar]
  23. Strang, G. Introduction to Linear Algebra; SIAM: Philadelphia, PA, USA, 2022. [Google Scholar]
Figure 1. Schematic view of the challenge–response protocol. Bob publishes K pub during setup. In each session, Alice issues a random challenge index i, Bob reveals the corresponding secret matrix A i , and Alice verifies the conjugacy relation A i 1 P i ( x ) A i = P σ ( i ) ( x ) .
Figure 1. Schematic view of the challenge–response protocol. Bob publishes K pub during setup. In each session, Alice issues a random challenge index i, Bob reveals the corresponding secret matrix A i , and Alice verifies the conjugacy relation A i 1 P i ( x ) A i = P σ ( i ) ( x ) .
Cryptography 10 00007 g001
Figure 2. Evolution of execution time and energy consumption as a function of prime size.
Figure 2. Evolution of execution time and energy consumption as a function of prime size.
Cryptography 10 00007 g002
Figure 3. Throughput and energy efficiency on logarithmic scale for different prime sizes.
Figure 3. Throughput and energy efficiency on logarithmic scale for different prime sizes.
Cryptography 10 00007 g003
Table 1. Indicative parameter choices for illustrative and bounded-use deployments.
Table 1. Indicative parameter choices for illustrative and bounded-use deployments.
ParameterTypical ValueRemarks
k3Recommended baseline; k = 2 illustrative only
n 10 2 10 3 Number of secret factors (total available revelations)
p 2 256 Large prime field to avoid algebraic artifacts
xrandom in [ 1 , p 1 ] Exponent controlling matrix powers
Table 2. Performance results of the matrix-based primitive for different prime sizes.
Table 2. Performance results of the matrix-based primitive for different prime sizes.
Parameter128 Bits256 Bits512 Bits1024 Bits
General Results
Successful executions20/20 (100%)20/20 (100%)20/20 (100%)20/20 (100%)
Average matrix attempts1.00 ± 0.001.00 ± 0.001.00 ± 0.001.00 ± 0.00
Execution Times (s)
Prime and matrix generation0.0055 ± 0.00210.0484 ± 0.05360.4346 ± 0.12911.8857 ± 0.4027
Public-key generation0.0021 ± 0.00060.0044 ± 0.00110.0109 ± 0.00300.0287 ± 0.0109
Exchange and calculation0.0043 ± 0.00740.0079 ± 0.01010.0116 ± 0.00490.0277 ± 0.0147
Verification0.0001 ± 0.00000.0024 ± 0.00970.0002 ± 0.00000.0002 ± 0.0001
Total0.0120 ± 0.00830.0632 ± 0.06400.4572 ± 0.12811.9424 ± 0.3987
Energy Consumption
CPU Power (W)23.3323.3323.3323.33
Energy consumed (J)0.2802 ± 0.19301.4736 ± 1.492210.6682 ± 2.988845.3221 ± 9.3041
Detailed Statistics
Minimum time (s)0.00760.03300.36931.6701
Maximum time (s)0.04430.32320.96253.6019
Minimum energy (J)0.17680.76998.618038.9699
Maximum energy (J)1.03397.542022.457384.0437
Performance
Operations/second183.1020.652.300.53
Table 3. Scalability analysis of the matrix-based primitive.
Table 3. Scalability analysis of the matrix-based primitive.
Prime Size (Bits)Operations/sTotal Time (s)Energy (J)Efficiency (ops/J)
128183.100.01200.2802653.46
25620.650.06321.473614.01
5122.300.457210.66820.22
10240.531.942445.32210.01
Table 4. Time distribution by protocol phase.
Table 4. Time distribution by protocol phase.
Prime Size (Bits)Generation (%)Public Keys (%)Exchange (%)Verification (%)
12845.517.935.51.0
25676.77.012.43.8
51295.02.42.50.0
102497.11.51.40.0
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Alarcón-Narváez, D.; Lizama-Pérez, L.A.; Jacques-García, F.A. Autopotency and Conjugacy of Non-Diagonalizable Matrices for Challenge–Response Authentication. Cryptography 2026, 10, 7. https://doi.org/10.3390/cryptography10010007

AMA Style

Alarcón-Narváez D, Lizama-Pérez LA, Jacques-García FA. Autopotency and Conjugacy of Non-Diagonalizable Matrices for Challenge–Response Authentication. Cryptography. 2026; 10(1):7. https://doi.org/10.3390/cryptography10010007

Chicago/Turabian Style

Alarcón-Narváez, Daniel, Luis Adrián Lizama-Pérez, and Fausto Abraham Jacques-García. 2026. "Autopotency and Conjugacy of Non-Diagonalizable Matrices for Challenge–Response Authentication" Cryptography 10, no. 1: 7. https://doi.org/10.3390/cryptography10010007

APA Style

Alarcón-Narváez, D., Lizama-Pérez, L. A., & Jacques-García, F. A. (2026). Autopotency and Conjugacy of Non-Diagonalizable Matrices for Challenge–Response Authentication. Cryptography, 10(1), 7. https://doi.org/10.3390/cryptography10010007

Article Metrics

Back to TopTop