“…(e.g., see [9,13]) due to the inherent linearity of the underlying matrices' operations. Designing a secure key exchange algorithm based on matrices or other non-commutative finite groups/rings with efficient operations remains a very interesting and challenging research problem.…”