On key exchange protocol based on Two-side multiplication action
By: Alvaro Otero Sanchez
Potential Business Impact:
Breaks secret codes by solving math puzzles.
We present a cryptanalysis of a key exchange protocol based on the digital semiring. For this purpose, we find the maximal solution of a linear system over such semiring, and use the properties of circulant matrix to demonstrate that the protocol is vulnerable. Specifically, we provide an efficient attack that recovers the shared secret key from publicly exchanged information for any instance of the digital semiring in polynomial time.
Similar Papers
Key exchange protocol based on circulant matrix action over congruence-simple semiring
Commutative Algebra
Makes secret messages safe from hackers.
Cryptoanalysis of a tropical triad matrix semiring key exchange protocol
Commutative Algebra
Makes secret codes harder for hackers to break.
Semigroup-homomorphic Signature
Cryptography and Security
Keeps secret messages safe even when shared.