Abstract
A matrix-based Diffie-Hellman-like key exchange protocol and utilizing it secure key-exchange protocol similar to HMQV are proposed. The proposed key exchange protocol uses matrix multiplication operation only; it does not rely on the complexity of the discrete logarithm problem contrary to the prototype and its known variants. Two-way arrival at the common key, similar to that employed in the Diffie-Hellman protocol, is provided by specially constructed commutative matrices. The trap-door property ensuring the proposed protocol security is based on exploiting of a non-invertible public matrix in the key generating process.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inform Theory 22(6):644–654
Odoni RWK, Varadharajan V, Sanders PW (1984) Public key distribution in matrix rings. Electron Lett 20(9):386–387
Varadharajan V, Odoni R (1986) Security of public key distribution in matrix rings. Electron Lett 22(1):46–47
Alvarez R, Martinez FM, Vicent JF, Zamora A (2008) A matricial public key cryptosystem with digital signature. WSEAS Trans Math 7(4):195–204
Alvarez R, Tortosa L, Vicent JF, Zamora A (2009) Analysis and design of a secure key exchange scheme. Inform Sci 179:2014–2021
Vasco MIG, del Pozo ALP, Duarte PT (2009) Cryptanalysis of a key exchange scheme based on block matrices. http://eprint.iacr.org/2009/553.pdf Accessed 29 May 2013
Yang J, Yang X (2008) A new variant of the Diffie-Hellman key exchange protocol based on block triangular matrix groups. International Conference Intelligent Information Hiding and Multimedia Signal Processing, pp 1277–1281. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4604276 Accessed 29 May 2013
Nelson JB (2003) The Diffie-Hellman key exchange protocol in matrices over a field and a ring. MS. Thesis, Dept. Math., Texas Technical University. http://repositories.tdl.org/ttu-ir/bitstream/handle/2346/22169/31295017074922.pdf?sequence=1 Accessed 29 May 2013
Anshel I, Anshel M, Goldfeld D (1999) An algebraic method for public-key cryptography. Math Res Lett 6:1–5
Grigoriev D, Ponomarenko I, (2005) Constructions in public-key cryptography over matrix groups. Contemp Mathe 418:103–119. http://arxiv.org/PS_cache/math/pdf/0506/0506180v1.pdf Accessed 29 May 2013
Diffie W, van Oorschot PC, Wiener MJ (1982) Authentication and authenticated key exchange. Des Codes Crypt 2(2):107–125
Law L, Menezes A, Qu M, Solinas J, Vanstone S (2003) An efficient protocol for authenticated key agreement. Des Codes Crypt 28(2):119–134
Krawczyk H (2005) HMQV: A High-Performance Secure Diffe-Hellman Protocol, In Proc. Of Advances in Cryptology - CRYPTO 2005. 25\(^{th}\) Annual International Cryptology Conference, Santa Barbara, California, USA, August 14–18, 2005. Lecture Notes in Computer Science 3621:546–566
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this paper
Cite this paper
Chefranov, A.G., Mahmoud, A.Y. (2013). Commutative Matrix-based Diffie-Hellman-Like Key-Exchange Protocol. In: Gelenbe, E., Lent, R. (eds) Information Sciences and Systems 2013. Lecture Notes in Electrical Engineering, vol 264. Springer, Cham. https://doi.org/10.1007/978-3-319-01604-7_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-01604-7_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-01603-0
Online ISBN: 978-3-319-01604-7
eBook Packages: Computer ScienceComputer Science (R0)