Paper 2023/1707

Analysis of four protocols based on tropical circulant matrices

Ivan Buchinskiy, Sobolev Institute of Mathematics of SB RAS
Matvei Kotov, Sobolev Institute of Mathematics of SB RAS
Alexander Treier, Sobolev Institute of Mathematics of SB RAS
Abstract

Several key exchange protocols based on tropical circulant matrices were proposed in the last two years. In this paper, we show that protocols offered by M. Durcheva [M. I. Durcheva. TrES: Tropical Encryption Scheme Based on Double Key Exchange. In: Eur. J. Inf. Tech. Comp. Sci. 2.4 (2022), pp. 11–17], by B. Amutha and R. Perumal [B. Amutha and R. Perumal. Public key exchange protocols based on tropical lower circulant and anti-circulant matrices. In: AIMS Math. 8.7 (2023), pp. 17307–17334.], and by H. Huang, C. Li, and L. Deng [H. Huang, C. Li, and L. Deng. Public-Key Cryptography Based on Tropical Circular Matrices. In: Appl. Sci. 12.15 (2022), p. 7401] are insecure.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
key exchange protocoltropical algebramin-plus algebramax-plus algebracirculant matrices
Contact author(s)
buchvan @ mail ru
matvej kotov @ gmail com
alexander treyer @ gmail com
History
2023-11-06: approved
2023-11-03: received
See all versions
Short URL
https://ia.cr/2023/1707
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/1707,
      author = {Ivan Buchinskiy and Matvei Kotov and Alexander Treier},
      title = {Analysis of four protocols based on tropical circulant matrices},
      howpublished = {Cryptology ePrint Archive, Paper 2023/1707},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/1707}},
      url = {https://eprint.iacr.org/2023/1707}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.