MAKE: A matrix action key exchange

نویسندگان

چکیده

Abstract We offer a public key exchange protocol based on semidirect product of two cyclic (semi)groups matrices over Z p {{\mathbb{Z}}}_{p} . One the is additive, and other one multiplicative. This allows us to take advantage both operations diffuse information. note that in our protocol, no power any matrix or element ever exposed, so standard classical attacks Diffie–Hellman-like protocols are not applicable.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Threshold Password-based Authenticated Key Exchange using Matrix

Authentication protocols rely on the possession of keys by the parties to be authenticated. For security, keys must be chosen randomly and have to have a long length from 100 bits to thousands of bits. But such keys are difficult to memorize for humans. Password-based authenticated key exchange protocols offer an efficient method to achieve an authentication and a secure communication between t...

متن کامل

Development of Matrix Cipher Modifications and Key Exchange Protocol

..................................................................................................................... iii ÖZ ...................................................................................................................................... v DEDICATION ................................................................................................................. vii ACKNOW...

متن کامل

Social key exchange network - from ad-hoc key exchange to a dense key network

Security of public key cryptography is steadily threatened by advancements in algorithmics and computing power. In this work we propose a novel approach to long-term secure key exchange based on security assumptions that are independent of strong complexity assumptions. We present a key propagation scheme that sets up a network of distributed keys. Whenever two parties meet, they exchange new k...

متن کامل

Cryptography. key exchange, public key

General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and decryption/decoding may be done simultan...

متن کامل

A new key exchange cryptosystem

In this paper,we will present a new key exchange system based on linear algebra, which spend less operations but weaker in security than the DiffieHellman’s one.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Mathematical Cryptology

سال: 2022

ISSN: ['1862-2984', '1862-2976']

DOI: https://doi.org/10.1515/jmc-2020-0053