An attack on a key exchange protocol based on max-times and min-times algebras

被引:2
作者
Buchinskiy, Ivan [1 ]
Kotov, Matvei [1 ]
Treier, Alexander [1 ]
机构
[1] RAS, Sobolev Inst Math, SB, Ul Pevtsova 13, Omsk 644043, Russia
关键词
Key exchange protocol; Tropical algebra; Max-times algebra; Min-times algebra; Matrix powers;
D O I
10.1007/s13226-023-00469-0
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
In this paper, we examine one of the public key exchange protocols proposed (in: Durcheva, AIP Conference Proceedings 1631:336-343, 2014) which uses max-times and min-times algebras. We discuss properties of powers of matrices over these algebras and introduce a fast attack on this protocol.
引用
收藏
页码:180 / 190
页数:11
相关论文
共 33 条
[1]  
Ahmed K., 2022, CRYPTOLOGIA, P1
[2]  
[Anonymous], 2011, Non-commutative Cryptography and Complexity of Group-theoretic Problems
[3]  
Baccelli F, 1992, SYNCHRONIZATION LINE
[4]  
Butkovic P, 2010, SPRINGER MONOGR MATH, P1, DOI 10.1007/978-1-84996-299-5
[5]   A LINEAR-SYSTEM-THEORETIC VIEW OF DISCRETE-EVENT PROCESSES AND ITS USE FOR PERFORMANCE EVALUATION IN MANUFACTURING [J].
COHEN, G ;
DUBOIS, D ;
QUADRAT, JP ;
VIOT, M .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1985, 30 (03) :210-220
[6]  
Cuninghame-Green R., 1979, LECT NOTES EC MATH S, V166
[7]   MINIMAX ALGEBRA AND APPLICATIONS [J].
CUNINGHAMEGREEN, RA .
FUZZY SETS AND SYSTEMS, 1991, 41 (03) :251-267
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]  
Durcheva M, 2018, INT J INF TECHNOL SE, V10, P47
[10]   A Public Key Encryption Scheme Based on Idempotent Semirings [J].
Durcheva, Mariana ;
Rachev, Martin .
41ST INTERNATIONAL CONFERENCE APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE'15), 2015, 1690