Score: 0

On key exchange protocol based on Two-side multiplication action

Published: April 22, 2025 | arXiv ID: 2504.15880v2

By: Alvaro Otero Sanchez

Potential Business Impact:

Breaks secret codes by solving math puzzles.

Business Areas:
Cryptocurrency Financial Services, Payments, Software

We present a cryptanalysis of a key exchange protocol based on the digital semiring. For this purpose, we find the maximal solution of a linear system over such semiring, and use the properties of circulant matrix to demonstrate that the protocol is vulnerable. Specifically, we provide an efficient attack that recovers the shared secret key from publicly exchanged information for any instance of the digital semiring in polynomial time.

Page Count
13 pages

Category
Computer Science:
Cryptography and Security