Abstract
A matrix-based Diffie-Hellman-like key exchange protocol and utilizing it secure key-exchange protocol similar to HMQV are proposed. The proposed key exchange protocol uses matrix multiplication operation only; it does not rely on the complexity of the discrete logarithm problem contrary to the prototype and its known variants. Two-way arrival at the common key, similar to that employed in the Diffie-Hellman protocol, is provided by specially constructed commutative matrices. The trap-door property ensuring the proposed protocol security is based on exploiting of a non-invertible public matrix in the key generating process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inform Theory 22(6):644–654
Odoni RWK, Varadharajan V, Sanders PW (1984) Public key distribution in matrix rings. Electron Lett 20(9):386–387
Varadharajan V, Odoni R (1986) Security of public key distribution in matrix rings. Electron Lett 22(1):46–47
Alvarez R, Martinez FM, Vicent JF, Zamora A (2008) A matricial public key cryptosystem with digital signature. WSEAS Trans Math 7(4):195–204
Alvarez R, Tortosa L, Vicent JF, Zamora A (2009) Analysis and design of a secure key exchange scheme. Inform Sci 179:2014–2021
Vasco MIG, del Pozo ALP, Duarte PT (2009) Cryptanalysis of a key exchange scheme based on block matrices. http://eprint.iacr.org/2009/553.pdf Accessed 29 May 2013
Yang J, Yang X (2008) A new variant of the Diffie-Hellman key exchange protocol based on block triangular matrix groups. International Conference Intelligent Information Hiding and Multimedia Signal Processing, pp 1277–1281. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4604276 Accessed 29 May 2013
Nelson JB (2003) The Diffie-Hellman key exchange protocol in matrices over a field and a ring. MS. Thesis, Dept. Math., Texas Technical University. http://repositories.tdl.org/ttu-ir/bitstream/handle/2346/22169/31295017074922.pdf?sequence=1 Accessed 29 May 2013
Anshel I, Anshel M, Goldfeld D (1999) An algebraic method for public-key cryptography. Math Res Lett 6:1–5
Grigoriev D, Ponomarenko I, (2005) Constructions in public-key cryptography over matrix groups. Contemp Mathe 418:103–119. http://arxiv.org/PS_cache/math/pdf/0506/0506180v1.pdf Accessed 29 May 2013
Diffie W, van Oorschot PC, Wiener MJ (1982) Authentication and authenticated key exchange. Des Codes Crypt 2(2):107–125
Law L, Menezes A, Qu M, Solinas J, Vanstone S (2003) An efficient protocol for authenticated key agreement. Des Codes Crypt 28(2):119–134
Krawczyk H (2005) HMQV: A High-Performance Secure Diffe-Hellman Protocol, In Proc. Of Advances in Cryptology - CRYPTO 2005. 25\(^{th}\) Annual International Cryptology Conference, Santa Barbara, California, USA, August 14–18, 2005. Lecture Notes in Computer Science 3621:546–566
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this paper
Cite this paper
Chefranov, A.G., Mahmoud, A.Y. (2013). Commutative Matrix-based Diffie-Hellman-Like Key-Exchange Protocol. In: Gelenbe, E., Lent, R. (eds) Information Sciences and Systems 2013. Lecture Notes in Electrical Engineering, vol 264. Springer, Cham. https://doi.org/10.1007/978-3-319-01604-7_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-01604-7_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-01603-0
Online ISBN: 978-3-319-01604-7
eBook Packages: Computer ScienceComputer Science (R0)