On implementation of Stickel's key exchange protocol over max-min and max-T semirings

Given that the tropical Stickel protocol and its variants are all vulnerable to the generalized Kotov–Ushakov attack, we suggest employing the max-min semiring and, more generally, max- semiring where the multiplication is based on a -norm, as a framework to implement the Stickel protocol. While the...

Full description

Saved in:
Bibliographic Details
Published inJournal of mathematical cryptology Vol. 18; no. 1; pp. 644 - 54
Main Authors Alhussaini, Sulaiman, Sergeev, Sergeĭ
Format Journal Article
LanguageEnglish
Published Berlin De Gruyter 26.11.2024
Walter de Gruyter GmbH
Subjects
Online AccessGet full text
ISSN1862-2984
1862-2976
1862-2984
DOI10.1515/jmc-2024-0014

Cover

Loading…
Abstract Given that the tropical Stickel protocol and its variants are all vulnerable to the generalized Kotov–Ushakov attack, we suggest employing the max-min semiring and, more generally, max- semiring where the multiplication is based on a -norm, as a framework to implement the Stickel protocol. While the Stickel protocol over max-min semiring or max- semiring remains susceptible to a form of Kotov–Ushakov attack, we demonstrate that it exhibits significantly increased resistance against this attack when compared to the tropical (max-plus) implementation.
AbstractList Given that the tropical Stickel protocol and its variants are all vulnerable to the generalized Kotov–Ushakov attack, we suggest employing the max-min semiring and, more generally, max-TT semiring where the multiplication is based on a TT-norm, as a framework to implement the Stickel protocol. While the Stickel protocol over max-min semiring or max-TT semiring remains susceptible to a form of Kotov–Ushakov attack, we demonstrate that it exhibits significantly increased resistance against this attack when compared to the tropical (max-plus) implementation.
Given that the tropical Stickel protocol and its variants are all vulnerable to the generalized Kotov–Ushakov attack, we suggest employing the max-min semiring and, more generally, max- semiring where the multiplication is based on a -norm, as a framework to implement the Stickel protocol. While the Stickel protocol over max-min semiring or max- semiring remains susceptible to a form of Kotov–Ushakov attack, we demonstrate that it exhibits significantly increased resistance against this attack when compared to the tropical (max-plus) implementation.
Given that the tropical Stickel protocol and its variants are all vulnerable to the generalized Kotov–Ushakov attack, we suggest employing the max-min semiring and, more generally, max- [Image omitted] semiring where the multiplication is based on a [Image omitted] -norm, as a framework to implement the Stickel protocol. While the Stickel protocol over max-min semiring or max- [Image omitted] semiring remains susceptible to a form of Kotov–Ushakov attack, we demonstrate that it exhibits significantly increased resistance against this attack when compared to the tropical (max-plus) implementation.
Given that the tropical Stickel protocol and its variants are all vulnerable to the generalized Kotov–Ushakov attack, we suggest employing the max-min semiring and, more generally, max- T T semiring where the multiplication is based on a T T -norm, as a framework to implement the Stickel protocol. While the Stickel protocol over max-min semiring or max- T T semiring remains susceptible to a form of Kotov–Ushakov attack, we demonstrate that it exhibits significantly increased resistance against this attack when compared to the tropical (max-plus) implementation.
Author Alhussaini, Sulaiman
Sergeev, Sergeĭ
Author_xml – sequence: 1
  givenname: Sulaiman
  surname: Alhussaini
  fullname: Alhussaini, Sulaiman
  email: saa399@student.bham.ac.uk
  organization: School of Mathematics, University of Birmingham, Birmingham, Edgbaston B5 2TT, United Kingdom
– sequence: 2
  givenname: Sergeĭ
  surname: Sergeev
  fullname: Sergeev, Sergeĭ
  email: s.sergeev@bham.ac.uk
  organization: School of Mathematics, University of Birmingham, Birmingham, Edgbaston B5 2TT, United Kingdom
BookMark eNp1UU1P3DAUtCoqFWiPvVvqgVOKn_PlHBGCFgmJQ-FsPTsvWy-JvdhZYP99vYSqqGpPHlkz8-a9OWIHPnhi7DOIr1BDfbqebCGFrAohoHrHDkE1spCdqg7e4A_sKKW1EE2rFByyuxvP3bQZaSI_4-yC52HgP2Zn72k8Sfyedpye7U_0K-KbGOZgw8jDI0U-4XMxOc_R9y_4lieaXHR-lT6y9wOOiT69vsfs7vLi9vx7cX3z7er87LqwFXRzgW1NSG3Tq9Y0QJIsmpZU3YMyKBpZdqpVQshaWAsDmkzLkqEfoLJYG1kes6vFtw-41pvoJow7HdDpl48QVxpj3mUkXTXlgG3XkzF9ZZUw0ElbG8hTjIESsteXxStv-bClNOt12Eaf4-sSmq7JJy5FZpULy8aQUqRBW7fcbY7oRg1C77vQuQu970Lvu8iq4i_V76z_46uF_4TjTLGnVdzuMvgT6Z86UFD-AgQ8oDs
CitedBy_id crossref_primary_10_3390_encyclopedia5010026
Cites_doi 10.1109/ICITA.2005.33
10.1142/5683
10.1016/S0012-365X(02)00754-9
10.1090/conm/616/12301
10.3934/math.2023885
10.1080/23799927.2020.1862303
10.3390/app12157401
10.1515/jmc-2019-0061
10.1515/jmc-2016-0064
10.1016/0165-0114(84)90026-5
10.1080/00927872.2021.1975125
10.1016/S0165-0114(01)00108-7
10.1080/00927872.2019.1581213
10.1016/j.fss.2014.11.008
10.1080/00927872.2013.766827
10.21136/AM.2020.0325-19
10.1109/TIT.1976.1055638
10.1016/S0167-6377(02)00159-1
ContentType Journal Article
Copyright This work is published under http://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: This work is published under http://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOA
DOI 10.1515/jmc-2024-0014
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList

Computer and Information Systems Abstracts
CrossRef
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
EISSN 1862-2984
EndPage 54
ExternalDocumentID oai_doaj_org_article_463fa79debbd4c80b192c5b1623bb131
10_1515_jmc_2024_0014
10_1515_jmc_2024_0014181
GroupedDBID 0R~
0~D
4.4
AAFPC
AAFWJ
AAGVJ
AAQCX
AASOL
AASQH
AAXCG
ABAOT
ABAQN
ABFKT
ABIQR
ABSOE
ABUVI
ABXMZ
ABYKJ
ACEFL
ACGFS
ACIWK
ACZBO
ADGQD
ADGYE
ADJVZ
ADOZN
AEJTT
AEQDQ
AERZL
AEXIE
AFBAA
AFBDD
AFCXV
AFPKN
AFQUK
AHGSO
AIERV
AJATJ
AKXKS
ALMA_UNASSIGNED_HOLDINGS
AMVHM
BAKPI
BBCWN
BCIFA
CFGNV
CS3
EBS
GROUPED_DOAJ
HZ~
IY9
J9A
M48
O9-
OK1
P2P
PQQKQ
QD8
RDG
SA.
SLJYH
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c419t-a75eae76d87b61e2ecab7e85d18ba0623987800250cc1fab87ba75fdf14ca5b23
IEDL.DBID DOA
ISSN 1862-2984
1862-2976
IngestDate Wed Aug 27 01:30:05 EDT 2025
Mon Jun 30 10:03:03 EDT 2025
Thu Apr 24 23:04:52 EDT 2025
Tue Jul 01 04:26:42 EDT 2025
Thu Jul 10 10:31:07 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License This work is licensed under the Creative Commons Attribution 4.0 International License.
http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c419t-a75eae76d87b61e2ecab7e85d18ba0623987800250cc1fab87ba75fdf14ca5b23
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
OpenAccessLink https://doaj.org/article/463fa79debbd4c80b192c5b1623bb131
PQID 3169615130
PQPubID 2030086
PageCount 15
ParticipantIDs doaj_primary_oai_doaj_org_article_463fa79debbd4c80b192c5b1623bb131
proquest_journals_3169615130
crossref_citationtrail_10_1515_jmc_2024_0014
crossref_primary_10_1515_jmc_2024_0014
walterdegruyter_journals_10_1515_jmc_2024_0014181
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-11-26
PublicationDateYYYYMMDD 2024-11-26
PublicationDate_xml – month: 11
  year: 2024
  text: 2024-11-26
  day: 26
PublicationDecade 2020
PublicationPlace Berlin
PublicationPlace_xml – name: Berlin
PublicationTitle Journal of mathematical cryptology
PublicationYear 2024
Publisher De Gruyter
Walter de Gruyter GmbH
Publisher_xml – name: De Gruyter
– name: Walter de Gruyter GmbH
References 2024112615512245232_j_jmc-2024-0014_ref_008
2024112615512245232_j_jmc-2024-0014_ref_019
2024112615512245232_j_jmc-2024-0014_ref_009
2024112615512245232_j_jmc-2024-0014_ref_004
2024112615512245232_j_jmc-2024-0014_ref_015
2024112615512245232_j_jmc-2024-0014_ref_005
2024112615512245232_j_jmc-2024-0014_ref_016
2024112615512245232_j_jmc-2024-0014_ref_006
2024112615512245232_j_jmc-2024-0014_ref_017
2024112615512245232_j_jmc-2024-0014_ref_007
2024112615512245232_j_jmc-2024-0014_ref_018
2024112615512245232_j_jmc-2024-0014_ref_011
2024112615512245232_j_jmc-2024-0014_ref_022
2024112615512245232_j_jmc-2024-0014_ref_001
2024112615512245232_j_jmc-2024-0014_ref_012
2024112615512245232_j_jmc-2024-0014_ref_023
2024112615512245232_j_jmc-2024-0014_ref_002
2024112615512245232_j_jmc-2024-0014_ref_013
2024112615512245232_j_jmc-2024-0014_ref_003
2024112615512245232_j_jmc-2024-0014_ref_014
2024112615512245232_j_jmc-2024-0014_ref_020
2024112615512245232_j_jmc-2024-0014_ref_010
2024112615512245232_j_jmc-2024-0014_ref_021
References_xml – ident: 2024112615512245232_j_jmc-2024-0014_ref_002
  doi: 10.1109/ICITA.2005.33
– ident: 2024112615512245232_j_jmc-2024-0014_ref_021
  doi: 10.1142/5683
– ident: 2024112615512245232_j_jmc-2024-0014_ref_015
  doi: 10.1016/S0012-365X(02)00754-9
– ident: 2024112615512245232_j_jmc-2024-0014_ref_010
  doi: 10.1090/conm/616/12301
– ident: 2024112615512245232_j_jmc-2024-0014_ref_017
  doi: 10.3934/math.2023885
– ident: 2024112615512245232_j_jmc-2024-0014_ref_007
  doi: 10.1080/23799927.2020.1862303
– ident: 2024112615512245232_j_jmc-2024-0014_ref_016
  doi: 10.3390/app12157401
– ident: 2024112615512245232_j_jmc-2024-0014_ref_009
  doi: 10.1515/jmc-2019-0061
– ident: 2024112615512245232_j_jmc-2024-0014_ref_018
– ident: 2024112615512245232_j_jmc-2024-0014_ref_004
  doi: 10.1515/jmc-2016-0064
– ident: 2024112615512245232_j_jmc-2024-0014_ref_013
  doi: 10.1016/0165-0114(84)90026-5
– ident: 2024112615512245232_j_jmc-2024-0014_ref_008
  doi: 10.1080/00927872.2021.1975125
– ident: 2024112615512245232_j_jmc-2024-0014_ref_014
– ident: 2024112615512245232_j_jmc-2024-0014_ref_019
  doi: 10.1016/S0165-0114(01)00108-7
– ident: 2024112615512245232_j_jmc-2024-0014_ref_006
  doi: 10.1080/00927872.2019.1581213
– ident: 2024112615512245232_j_jmc-2024-0014_ref_011
  doi: 10.1016/j.fss.2014.11.008
– ident: 2024112615512245232_j_jmc-2024-0014_ref_012
– ident: 2024112615512245232_j_jmc-2024-0014_ref_003
  doi: 10.1080/00927872.2013.766827
– ident: 2024112615512245232_j_jmc-2024-0014_ref_005
  doi: 10.21136/AM.2020.0325-19
– ident: 2024112615512245232_j_jmc-2024-0014_ref_020
– ident: 2024112615512245232_j_jmc-2024-0014_ref_001
  doi: 10.1109/TIT.1976.1055638
– ident: 2024112615512245232_j_jmc-2024-0014_ref_022
  doi: 10.1016/S0167-6377(02)00159-1
– ident: 2024112615512245232_j_jmc-2024-0014_ref_023
SSID ssj0067881
Score 2.3182569
Snippet Given that the tropical Stickel protocol and its variants are all vulnerable to the generalized Kotov–Ushakov attack, we suggest employing the max-min semiring...
SourceID doaj
proquest
crossref
walterdegruyter
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 644
SubjectTerms 08A72
15A80
94A60
cryptographic attack
fuzzy algebra
fuzzy relation equations
public key cryptography
Rings (mathematics)
Stickel protocol
SummonAdditionalLinks – databaseName: Scholars Portal Journals: Open Access
  dbid: M48
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3Nb9MwFLdgXOBQbcC0sjL5gOCCoU4cOzkgtCGmCqlwYJV6i_w5FZqUNa3W_fe85yadBuPGLUqeLed9xL8X279HyKuQKi2UskxLlTB0ElbkmWAGUgFAC05lEk8jj7_K0UR8mWbTW0qhVoHNvakd1pOaLOfvNlc3HyHgP8TqPTx7_6OyYOxEMMT7D8kjmJQUxuhY7BYUJLKmtxSbfzW5MyVF5v47cLN3HReunb9crm9W3UJpnH_O90mvBY70dGvpA_LA10_Jk_GOdbV5Ribfajqrug3hqHG6CPQ7PPzp528aCvFK_WZ71JciQcMCvIDiHk5a6Q2rZjXVtYvXF7Tx1Qz_-TXPyeT888WnEWvLJjAreLFiWmVeeyVdrozkPvFWG-XzzPHc6KFEwj-VR-xjLQ_agBg0CS5wYXVmkvSQ7NWL2h8RCh8AZQK3yhRBJNCPAfRihcuDTBPorU_edporbcspjqUt5iXmFqDoEhRdoqJx75zok9c78V9bMo1_CZ6hGXZCyIEdbyyWl2UbUqWQadCqcN4YJ2w-NABWbWY4vKExPOV9MuiMWHZ-VaZcFgji0mGf8D8Meyt176AAC734H-M6Jo-j63HOEjkge6vl2r8EZLMyJ9FnfwNvRPga
  priority: 102
  providerName: Scholars Portal
Title On implementation of Stickel's key exchange protocol over max-min and max-T semirings
URI https://www.degruyter.com/doi/10.1515/jmc-2024-0014
https://www.proquest.com/docview/3169615130
https://doaj.org/article/463fa79debbd4c80b192c5b1623bb131
Volume 18
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NT9wwELUQp3JAlIJYCsiHqlywWCeOnRwBFaFK2x5gJW6RP9ECyVZkUZd_z4yTLGwF4tJLFCUTy5oZZ97Y42dCvoVUaaGUZVqqhKGTsCLPBDOQCgBacCqTuBt59EtejMXP6-z61VFfWBPW0gO3ijsWMg1aFc4b44TNhwYgic0Mh7BtDI87qBOIeX0y1f6DJZKkd4yaELCPbysL7pAIhhnBUgSKRP1L6HL9b1yndv7m4fFp1q-LxnBzvkHWO5xIT9r-fSYrvt4ka6MFyWrzhYx_13RS9fXfqGA6DfQSXt75-8OGwvCkft7u7KXIxzAFo1Ms2aSVnrNqUlNdu3h_RRtfTXCKr9ki4_MfV2cXrDslgVnBixnTKvPaK-lyZST3ibfaKJ9njudGDyXy-6k8Qh1redAGxOCT4AIXVmcmSbfJaj2t_Q6hMN6VCdwqUwSRQDsGwIoVLg8yTaC1ATnqNVfajkIcT7K4LzGVAEWXoOgSFY2lcmJAvi_E_7TcGe8JnqIZFkJIeR0fgCOUnSOUHznCgOz1Riy7cdiUKZcFYrZ0OCD8H8O-SL3ZKYA-u_-jX1_Jp-h6nLNE7pHV2cOj3wcgMzMH0WfhOhL5M2Io8iI
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwEB5B9wAcVjxFYQEfEFywWieOnRwXxFJgu3vYVuIW-blbaBLUpGL594zTJLA8LtyiZMZy5hF_dsafAZ77WCoupaFKyIiGIKFZmnCqcSqAaMHKRITdyPMTMVvyD5-Svpqw7soqrTvfbL83O4bUia3MNiyUDVwDOAJPPhcG_RtxGiD-5KIp1tdhTyD4T0ewdzh7d3baf45F4EvvyDX_0LwyGLWc_VeA5v639pf10J9fRp6j27DfQUZyuPPxHbjmyrtwaz7wrdb3YHlaklXRl4IHW5PKkzN8-MWtX9YEM5W4y90mXxKoGSr0PwnVm6RQl7RYlUSVtr1ekNoVq7DaV9-H5dHbxZsZ7Q5MoIazrKFKJk45KWwqtWAuckZp6dLEslSrqQhUfzJtUY8xzCuNYqjirWfcqERH8QMYlVXpHgLB1JfaMyN15nmE7WjELYbb1Is4wtbG8Kq3XG46NvFwqMU6D7MKNHSOhs6DoUPVHB_Di0H8645G41-Cr4MbBqHAft3eqDbneZdMORexVzKzTmvLTTrVCFNNohm-odYsZmM46J2YdylZ5zETWYBv8XQM7DfH_pT6a6cQBT36D51ncGO2mB_nx-9PPj6Gm23UMUYjcQCjZrN1TxDONPppF7A_AKoJ8uc
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Jb9QwFH6CqYTgULGKaQv4gOCCNePEsZNjWYZhaYvUjtSb5bUaaJJqMiPKv-c5kwkty4VblDxbzlvyPjvPnwGeh1RqLqWlWsiERiehRZ5xanAqgGjByUzE3cgHh2I64x9Ps9Mru_hjWaXzZ4vVj-WaIXXkaruKC2U91wBm4NHX0qJ9E04jxB9duHATtoQoUj6Arf3p--OjzddYRLr0jlvzj4bXclFL2X8NZ25_b_9Y98O5kngmd2G7Q4xkf23ie3DDV_fhzkFPt9o8gNlRReblphI8qprUgRzjw2_-_GVDMFCJv1zv8SWRmaFG85NYvElKfUnLeUV05drrE9L4ch4X-5qHMJu8O3kzpd15CdRyViyplpnXXgqXSyOYT7zVRvo8cyw3eiwi05_MW9BjLQvaoBg2CS4wbnVmkvQRDKq68o-BYORLE5iVpgg8wX4MwhbLXR5EmmBvQ3i10ZyyHZl4PNPiXMVJBSpaoaJVVHQsmuNDeNGLX6xZNP4l-DqaoReK5NftjXpxprpYUlykQcvCeWMct_nYIEq1mWH4hsawlA1hb2NE1UVko1Imioje0vEQ2G-G_SX110EhCNr5jzbP4NaXtxP1-cPhp1243TodYzQRezBYLlb-CYKZpXna-etPNXfyDQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=On+implementation+of+Stickel%27s+key+exchange+protocol+over+max-min+and+max-T+semirings&rft.jtitle=Journal+of+mathematical+cryptology&rft.au=Alhussaini+Sulaiman&rft.au=Sergeev+Serge%C4%AD&rft.date=2024-11-26&rft.pub=De+Gruyter&rft.eissn=1862-2984&rft.volume=18&rft.issue=1&rft.spage=644&rft.epage=54&rft_id=info:doi/10.1515%2Fjmc-2024-0014&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_463fa79debbd4c80b192c5b1623bb131
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1862-2984&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1862-2984&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1862-2984&client=summon