Appl.Math. 2020
DOI: 10.21136/am.2020.0325-19
|View full text |Cite
|
Sign up to set email alerts
|

Modifying the tropical version of Stickel's key exchange protocol

Abstract: Where a licence is displayed above, please note the terms and conditions of the licence govern your use of this document. When citing, please reference the published version. Take down policy While the University of Birmingham exercises care and attention in making items available there are rare occasions when an item has been uploaded in error or has been deemed to be commercially or otherwise sensitive.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 5 publications
0
10
0
1
Order By: Relevance
“…(4) Generalized KU attack. In order to remedy Grigoreiv-Shpilrain's protocols, Muanalifah and Sergeev suggested some modifications that use two types of matrices that are Jones matrices and Linde-de la Puente matrices [22]. But the authors also pointed out that their modifications cannot resist the generalized KU attack which can also decompose the public matrix into the product of two Jones matrices (Linde-de la Puente matrices) expressed as the linear form of the tropical basic elementary matrix.…”
Section: Possible Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…(4) Generalized KU attack. In order to remedy Grigoreiv-Shpilrain's protocols, Muanalifah and Sergeev suggested some modifications that use two types of matrices that are Jones matrices and Linde-de la Puente matrices [22]. But the authors also pointed out that their modifications cannot resist the generalized KU attack which can also decompose the public matrix into the product of two Jones matrices (Linde-de la Puente matrices) expressed as the linear form of the tropical basic elementary matrix.…”
Section: Possible Attacksmentioning
confidence: 99%
“…However, some attacks on the improved protocols are recently suggested by Rudy and Monico [19], Isaac and Kahrobei [20], and Muanalifah and Sergeev [21]. In order to remedy Grigoreiv-Shpilrain's protocols, Muanalifah and Sergeev suggested some modifications that use two classes of commuting matrices in tropical algebra [22]. But the authors also pointed out that their modifications cannot resist the generalized KU attack since the user's secret matrix can still be expressed in the linear form of the power of the basic elementary matrix.…”
Section: Introductionmentioning
confidence: 99%
“…However, the authors do not explicitly state the security of this scheme. Stickel's key exchange protocol in tropical algebra was updated by the authors [8] utilizing commuting matrices, and they also proposed additional protocols.…”
Section: Introductionmentioning
confidence: 99%
“…Diverse matrix forms were incorporated, ranging from singular [2,3] and non-singular matrices [4] to matrices over bit strings [5]; Tribonacci matrices [6]; Hadamar matrices [7]; non-negative [8] and lattice matrices [9]. Tropical matrices are also of interest ( [10][11][12][13][14][15]). Yet, despite these developments, vulnerabilities have persisted, as evidenced by different documented attacks (see, for example, [16][17][18][19]).…”
Section: Introductionmentioning
confidence: 99%