Skip to main content

Commutative Matrix-based Diffie-Hellman-Like Key-Exchange Protocol

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 264))

Abstract

A matrix-based Diffie-Hellman-like key exchange protocol and utilizing it secure key-exchange protocol similar to HMQV are proposed. The proposed key exchange protocol uses matrix multiplication operation only; it does not rely on the complexity of the discrete logarithm problem contrary to the prototype and its known variants. Two-way arrival at the common key, similar to that employed in the Diffie-Hellman protocol, is provided by specially constructed commutative matrices. The trap-door property ensuring the proposed protocol security is based on exploiting of a non-invertible public matrix in the key generating process.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inform Theory 22(6):644–654

    Article  MATH  MathSciNet  Google Scholar 

  2. Odoni RWK, Varadharajan V, Sanders PW (1984) Public key distribution in matrix rings. Electron Lett 20(9):386–387

    Article  Google Scholar 

  3. Varadharajan V, Odoni R (1986) Security of public key distribution in matrix rings. Electron Lett 22(1):46–47

    Article  Google Scholar 

  4. Alvarez R, Martinez FM, Vicent JF, Zamora A (2008) A matricial public key cryptosystem with digital signature. WSEAS Trans Math 7(4):195–204

    MathSciNet  Google Scholar 

  5. Alvarez R, Tortosa L, Vicent JF, Zamora A (2009) Analysis and design of a secure key exchange scheme. Inform Sci 179:2014–2021

    Article  MATH  MathSciNet  Google Scholar 

  6. Vasco MIG, del Pozo ALP, Duarte PT (2009) Cryptanalysis of a key exchange scheme based on block matrices. http://eprint.iacr.org/2009/553.pdf Accessed 29 May 2013

  7. Yang J, Yang X (2008) A new variant of the Diffie-Hellman key exchange protocol based on block triangular matrix groups. International Conference Intelligent Information Hiding and Multimedia Signal Processing, pp 1277–1281. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4604276 Accessed 29 May 2013

  8. Nelson JB (2003) The Diffie-Hellman key exchange protocol in matrices over a field and a ring. MS. Thesis, Dept. Math., Texas Technical University. http://repositories.tdl.org/ttu-ir/bitstream/handle/2346/22169/31295017074922.pdf?sequence=1 Accessed 29 May 2013

  9. Anshel I, Anshel M, Goldfeld D (1999) An algebraic method for public-key cryptography. Math Res Lett 6:1–5

    Article  MathSciNet  Google Scholar 

  10. Grigoriev D, Ponomarenko I, (2005) Constructions in public-key cryptography over matrix groups. Contemp Mathe 418:103–119. http://arxiv.org/PS_cache/math/pdf/0506/0506180v1.pdf Accessed 29 May 2013

    Google Scholar 

  11. Diffie W, van Oorschot PC, Wiener MJ (1982) Authentication and authenticated key exchange. Des Codes Crypt 2(2):107–125

    Article  Google Scholar 

  12. Law L, Menezes A, Qu M, Solinas J, Vanstone S (2003) An efficient protocol for authenticated key agreement. Des Codes Crypt 28(2):119–134

    Article  MATH  MathSciNet  Google Scholar 

  13. Krawczyk H (2005) HMQV: A High-Performance Secure Diffe-Hellman Protocol, In Proc. Of Advances in Cryptology - CRYPTO 2005. 25\(^{th}\) Annual International Cryptology Conference, Santa Barbara, California, USA, August 14–18, 2005. Lecture Notes in Computer Science 3621:546–566

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexander G. Chefranov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Chefranov, A.G., Mahmoud, A.Y. (2013). Commutative Matrix-based Diffie-Hellman-Like Key-Exchange Protocol. In: Gelenbe, E., Lent, R. (eds) Information Sciences and Systems 2013. Lecture Notes in Electrical Engineering, vol 264. Springer, Cham. https://doi.org/10.1007/978-3-319-01604-7_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-01604-7_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-01603-0

  • Online ISBN: 978-3-319-01604-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics