an:06288667
Zbl 1301.94114
Grigoriev, Dima; Shpilrain, Vladimir
Tropical cryptography
EN
Commun. Algebra 42, No. 6, 2624-2632 (2014).
0092-7872 1532-4125
2014
j
94A60 14T99 15A80
encryption; public key exchange; tropical algebra
This paper analyses replacement of classical algebraic operations with ones based on tropical algebras for two selected cryptographic schemas. It shows that this approach has two primary advantages: it eliminates known vulnerability of selected schemas against various linear algebra attacks and has improved efficiency as one does not have to perform any multiplications since tropical multiplication is the usual addition.
Tropical algebras are built over tropical semiring \(S\) with two operations \(x\oplus y=\min(x,y)\) and \(x\otimes y=x+y\). If we replace linear algebra with tropical one in a key exchange protocol built on an idea of \textit{E. Stickel} [A new method for exchanging secret keys, Proc. Third Int. Conf. on Information Technology and Applications (ICITA '05), Vol. 2, 426--430 (2005), \url{doi:10.1109/ICITA.2005.33}], we are able to show that it now resists the vulnerability of original approach described in [\textit{V. Shpilrain}, in: Computer science -- theory and applications. Third international computer science symposium in Russia, CSR 2008, Lect. Notes Comput. Sci. 5010, 283--288 (2008; Zbl 1142.94360)]. Another cryptographic schema analysed in this paper that would be susceptible to linear algebra attack in the classical case is a public key encryption scheme described in [\textit{T. T. Moh}, Commun. Algebra 27, No. 5, 2207--2222 (1999; Zbl 0933.94022)]. Two known attacks were analysed and proven infeasible.
Vladimír Lacko (Košice)
1142.94360; 0933.94022