MAKE: A matrix action key exchange
نویسندگان
چکیده
Abstract We offer a public key exchange protocol based on semidirect product of two cyclic (semi)groups matrices over Z p {{\mathbb{Z}}}_{p} . One the is additive, and other one multiplicative. This allows us to take advantage both operations diffuse information. note that in our protocol, no power any matrix or element ever exposed, so standard classical attacks Diffie–Hellman-like protocols are not applicable.
منابع مشابه
Threshold Password-based Authenticated Key Exchange using Matrix
Authentication protocols rely on the possession of keys by the parties to be authenticated. For security, keys must be chosen randomly and have to have a long length from 100 bits to thousands of bits. But such keys are difficult to memorize for humans. Password-based authenticated key exchange protocols offer an efficient method to achieve an authentication and a secure communication between t...
متن کاملDevelopment of Matrix Cipher Modifications and Key Exchange Protocol
..................................................................................................................... iii ÖZ ...................................................................................................................................... v DEDICATION ................................................................................................................. vii ACKNOW...
متن کاملSocial key exchange network - from ad-hoc key exchange to a dense key network
Security of public key cryptography is steadily threatened by advancements in algorithmics and computing power. In this work we propose a novel approach to long-term secure key exchange based on security assumptions that are independent of strong complexity assumptions. We present a key propagation scheme that sets up a network of distributed keys. Whenever two parties meet, they exchange new k...
متن کاملCryptography. key exchange, public key
General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and decryption/decoding may be done simultan...
متن کاملA new key exchange cryptosystem
In this paper,we will present a new key exchange system based on linear algebra, which spend less operations but weaker in security than the DiffieHellman’s one.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Mathematical Cryptology
سال: 2022
ISSN: ['1862-2984', '1862-2976']
DOI: https://doi.org/10.1515/jmc-2020-0053