Paper 2023/1707
Analysis of four protocols based on tropical circulant matrices
Abstract
Several key exchange protocols based on tropical circulant matrices were proposed in the last two years. In this paper, we show that protocols offered by M. Durcheva [M. I. Durcheva. TrES: Tropical Encryption Scheme Based on Double Key Exchange. In: Eur. J. Inf. Tech. Comp. Sci. 2.4 (2022), pp. 11–17], by B. Amutha and R. Perumal [B. Amutha and R. Perumal. Public key exchange protocols based on tropical lower circulant and anti-circulant matrices. In: AIMS Math. 8.7 (2023), pp. 17307–17334.], and by H. Huang, C. Li, and L. Deng [H. Huang, C. Li, and L. Deng. Public-Key Cryptography Based on Tropical Circular Matrices. In: Appl. Sci. 12.15 (2022), p. 7401] are insecure.
Metadata
- Available format(s)
- Category
- Attacks and cryptanalysis
- Publication info
- Published elsewhere. Minor revision. Indian Journal of Pure and Applied Mathematics
- DOI
- 10.1007/s13226-024-00737-7
- Keywords
- key exchange protocoltropical algebramin-plus algebramax-plus algebracirculant matrices
- Contact author(s)
-
buchvan @ mail ru
matvej kotov @ gmail com
alexander treyer @ gmail com - History
- 2024-12-21: revised
- 2023-11-03: received
- See all versions
- Short URL
- https://ia.cr/2023/1707
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2023/1707, author = {Ivan Buchinskiy and Matvei Kotov and Alexander Treier}, title = {Analysis of four protocols based on tropical circulant matrices}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/1707}, year = {2023}, doi = {10.1007/s13226-024-00737-7}, url = {https://eprint.iacr.org/2023/1707} }