Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices

Recently, public-key cryptography based on tropical semi-rings have been proposed. However, the majority of them are damaged. The main reason is that they use a public matrix to construct commutative matrix semi-rings. New public-key cryptosystems are proposed in this paper. They are based on tropic...

Full description

Bibliographic Details
Main Author: Huawei Huang
Format: Article
Language:English
Published: MDPI AG 2022-11-01
Series:Symmetry
Subjects:
Online Access:https://www.mdpi.com/2073-8994/14/11/2378
_version_ 1797466400772587520
author Huawei Huang
author_facet Huawei Huang
author_sort Huawei Huang
collection DOAJ
description Recently, public-key cryptography based on tropical semi-rings have been proposed. However, the majority of them are damaged. The main reason is that they use a public matrix to construct commutative matrix semi-rings. New public-key cryptosystems are proposed in this paper. They are based on tropical congruent transformation of symmetric matrix by circular matrix. The NP-hard problem of solving a tropical system of nonlinear equations underlies the cryptosystem’s security. Since a known matrix cannot express the used commutative subsemi-rings of circular matrices and there is no tropical matrix addition operation and power of matrix, the cryptosystems can withstand known attacks, including the KU attack, RM attack, and IK attack. The length of the public key and private key of the new cryptosystems is half that of those described in the literature.
first_indexed 2024-03-09T18:35:27Z
format Article
id doaj.art-a48bc84978fb4447b0ce22b0dca6bc9d
institution Directory Open Access Journal
issn 2073-8994
language English
last_indexed 2024-03-09T18:35:27Z
publishDate 2022-11-01
publisher MDPI AG
record_format Article
series Symmetry
spelling doaj.art-a48bc84978fb4447b0ce22b0dca6bc9d2023-11-24T07:09:21ZengMDPI AGSymmetry2073-89942022-11-011411237810.3390/sym14112378Cryptosystems Based on Tropical Congruent Transformation of Symmetric MatricesHuawei Huang0School of Mathematical Sciences, Guizhou Normal University, Guiyang 550001, ChinaRecently, public-key cryptography based on tropical semi-rings have been proposed. However, the majority of them are damaged. The main reason is that they use a public matrix to construct commutative matrix semi-rings. New public-key cryptosystems are proposed in this paper. They are based on tropical congruent transformation of symmetric matrix by circular matrix. The NP-hard problem of solving a tropical system of nonlinear equations underlies the cryptosystem’s security. Since a known matrix cannot express the used commutative subsemi-rings of circular matrices and there is no tropical matrix addition operation and power of matrix, the cryptosystems can withstand known attacks, including the KU attack, RM attack, and IK attack. The length of the public key and private key of the new cryptosystems is half that of those described in the literature.https://www.mdpi.com/2073-8994/14/11/2378public-key cryptographykey exchange protocoltropical symmetric matricescongruent transformation
spellingShingle Huawei Huang
Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices
Symmetry
public-key cryptography
key exchange protocol
tropical symmetric matrices
congruent transformation
title Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices
title_full Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices
title_fullStr Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices
title_full_unstemmed Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices
title_short Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices
title_sort cryptosystems based on tropical congruent transformation of symmetric matrices
topic public-key cryptography
key exchange protocol
tropical symmetric matrices
congruent transformation
url https://www.mdpi.com/2073-8994/14/11/2378
work_keys_str_mv AT huaweihuang cryptosystemsbasedontropicalcongruenttransformationofsymmetricmatrices