On implementation of Stickel's key exchange protocol over max-min and max-T semirings
Given that the tropical Stickel protocol and its variants are all vulnerable to the generalized Kotov–Ushakov attack, we suggest employing the max-min semiring and, more generally, max- semiring where the multiplication is based on a -norm, as a framework to implement the Stickel protocol. While the...
Saved in:
Published in | Journal of mathematical cryptology Vol. 18; no. 1; pp. 644 - 54 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Berlin
De Gruyter
26.11.2024
Walter de Gruyter GmbH |
Subjects | |
Online Access | Get full text |
ISSN | 1862-2984 1862-2976 1862-2984 |
DOI | 10.1515/jmc-2024-0014 |
Cover
Loading…
Abstract | Given that the tropical Stickel protocol and its variants are all vulnerable to the generalized Kotov–Ushakov attack, we suggest employing the max-min semiring and, more generally, max-
semiring where the multiplication is based on a
-norm, as a framework to implement the Stickel protocol. While the Stickel protocol over max-min semiring or max-
semiring remains susceptible to a form of Kotov–Ushakov attack, we demonstrate that it exhibits significantly increased resistance against this attack when compared to the tropical (max-plus) implementation. |
---|---|
AbstractList | Given that the tropical Stickel protocol and its variants are all vulnerable to the generalized Kotov–Ushakov attack, we suggest employing the max-min semiring and, more generally, max-TT semiring where the multiplication is based on a TT-norm, as a framework to implement the Stickel protocol. While the Stickel protocol over max-min semiring or max-TT semiring remains susceptible to a form of Kotov–Ushakov attack, we demonstrate that it exhibits significantly increased resistance against this attack when compared to the tropical (max-plus) implementation. Given that the tropical Stickel protocol and its variants are all vulnerable to the generalized Kotov–Ushakov attack, we suggest employing the max-min semiring and, more generally, max- semiring where the multiplication is based on a -norm, as a framework to implement the Stickel protocol. While the Stickel protocol over max-min semiring or max- semiring remains susceptible to a form of Kotov–Ushakov attack, we demonstrate that it exhibits significantly increased resistance against this attack when compared to the tropical (max-plus) implementation. Given that the tropical Stickel protocol and its variants are all vulnerable to the generalized Kotov–Ushakov attack, we suggest employing the max-min semiring and, more generally, max- [Image omitted] semiring where the multiplication is based on a [Image omitted] -norm, as a framework to implement the Stickel protocol. While the Stickel protocol over max-min semiring or max- [Image omitted] semiring remains susceptible to a form of Kotov–Ushakov attack, we demonstrate that it exhibits significantly increased resistance against this attack when compared to the tropical (max-plus) implementation. Given that the tropical Stickel protocol and its variants are all vulnerable to the generalized Kotov–Ushakov attack, we suggest employing the max-min semiring and, more generally, max- T T semiring where the multiplication is based on a T T -norm, as a framework to implement the Stickel protocol. While the Stickel protocol over max-min semiring or max- T T semiring remains susceptible to a form of Kotov–Ushakov attack, we demonstrate that it exhibits significantly increased resistance against this attack when compared to the tropical (max-plus) implementation. |
Author | Alhussaini, Sulaiman Sergeev, Sergeĭ |
Author_xml | – sequence: 1 givenname: Sulaiman surname: Alhussaini fullname: Alhussaini, Sulaiman email: saa399@student.bham.ac.uk organization: School of Mathematics, University of Birmingham, Birmingham, Edgbaston B5 2TT, United Kingdom – sequence: 2 givenname: Sergeĭ surname: Sergeev fullname: Sergeev, Sergeĭ email: s.sergeev@bham.ac.uk organization: School of Mathematics, University of Birmingham, Birmingham, Edgbaston B5 2TT, United Kingdom |
BookMark | eNp1UU1P3DAUtCoqFWiPvVvqgVOKn_PlHBGCFgmJQ-FsPTsvWy-JvdhZYP99vYSqqGpPHlkz8-a9OWIHPnhi7DOIr1BDfbqebCGFrAohoHrHDkE1spCdqg7e4A_sKKW1EE2rFByyuxvP3bQZaSI_4-yC52HgP2Zn72k8Sfyedpye7U_0K-KbGOZgw8jDI0U-4XMxOc_R9y_4lieaXHR-lT6y9wOOiT69vsfs7vLi9vx7cX3z7er87LqwFXRzgW1NSG3Tq9Y0QJIsmpZU3YMyKBpZdqpVQshaWAsDmkzLkqEfoLJYG1kes6vFtw-41pvoJow7HdDpl48QVxpj3mUkXTXlgG3XkzF9ZZUw0ElbG8hTjIESsteXxStv-bClNOt12Eaf4-sSmq7JJy5FZpULy8aQUqRBW7fcbY7oRg1C77vQuQu970Lvu8iq4i_V76z_46uF_4TjTLGnVdzuMvgT6Z86UFD-AgQ8oDs |
CitedBy_id | crossref_primary_10_3390_encyclopedia5010026 |
Cites_doi | 10.1109/ICITA.2005.33 10.1142/5683 10.1016/S0012-365X(02)00754-9 10.1090/conm/616/12301 10.3934/math.2023885 10.1080/23799927.2020.1862303 10.3390/app12157401 10.1515/jmc-2019-0061 10.1515/jmc-2016-0064 10.1016/0165-0114(84)90026-5 10.1080/00927872.2021.1975125 10.1016/S0165-0114(01)00108-7 10.1080/00927872.2019.1581213 10.1016/j.fss.2014.11.008 10.1080/00927872.2013.766827 10.21136/AM.2020.0325-19 10.1109/TIT.1976.1055638 10.1016/S0167-6377(02)00159-1 |
ContentType | Journal Article |
Copyright | This work is published under http://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: This work is published under http://creativecommons.org/licenses/by/4.0 (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D DOA |
DOI | 10.1515/jmc-2024-0014 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Mathematics |
EISSN | 1862-2984 |
EndPage | 54 |
ExternalDocumentID | oai_doaj_org_article_463fa79debbd4c80b192c5b1623bb131 10_1515_jmc_2024_0014 10_1515_jmc_2024_0014181 |
GroupedDBID | 0R~ 0~D 4.4 AAFPC AAFWJ AAGVJ AAQCX AASOL AASQH AAXCG ABAOT ABAQN ABFKT ABIQR ABSOE ABUVI ABXMZ ABYKJ ACEFL ACGFS ACIWK ACZBO ADGQD ADGYE ADJVZ ADOZN AEJTT AEQDQ AERZL AEXIE AFBAA AFBDD AFCXV AFPKN AFQUK AHGSO AIERV AJATJ AKXKS ALMA_UNASSIGNED_HOLDINGS AMVHM BAKPI BBCWN BCIFA CFGNV CS3 EBS GROUPED_DOAJ HZ~ IY9 J9A M48 O9- OK1 P2P PQQKQ QD8 RDG SA. SLJYH AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c419t-a75eae76d87b61e2ecab7e85d18ba0623987800250cc1fab87ba75fdf14ca5b23 |
IEDL.DBID | DOA |
ISSN | 1862-2984 1862-2976 |
IngestDate | Wed Aug 27 01:30:05 EDT 2025 Mon Jun 30 10:03:03 EDT 2025 Thu Apr 24 23:04:52 EDT 2025 Tue Jul 01 04:26:42 EDT 2025 Thu Jul 10 10:31:07 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
License | This work is licensed under the Creative Commons Attribution 4.0 International License. http://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c419t-a75eae76d87b61e2ecab7e85d18ba0623987800250cc1fab87ba75fdf14ca5b23 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
OpenAccessLink | https://doaj.org/article/463fa79debbd4c80b192c5b1623bb131 |
PQID | 3169615130 |
PQPubID | 2030086 |
PageCount | 15 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_463fa79debbd4c80b192c5b1623bb131 proquest_journals_3169615130 crossref_citationtrail_10_1515_jmc_2024_0014 crossref_primary_10_1515_jmc_2024_0014 walterdegruyter_journals_10_1515_jmc_2024_0014181 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-11-26 |
PublicationDateYYYYMMDD | 2024-11-26 |
PublicationDate_xml | – month: 11 year: 2024 text: 2024-11-26 day: 26 |
PublicationDecade | 2020 |
PublicationPlace | Berlin |
PublicationPlace_xml | – name: Berlin |
PublicationTitle | Journal of mathematical cryptology |
PublicationYear | 2024 |
Publisher | De Gruyter Walter de Gruyter GmbH |
Publisher_xml | – name: De Gruyter – name: Walter de Gruyter GmbH |
References | 2024112615512245232_j_jmc-2024-0014_ref_008 2024112615512245232_j_jmc-2024-0014_ref_019 2024112615512245232_j_jmc-2024-0014_ref_009 2024112615512245232_j_jmc-2024-0014_ref_004 2024112615512245232_j_jmc-2024-0014_ref_015 2024112615512245232_j_jmc-2024-0014_ref_005 2024112615512245232_j_jmc-2024-0014_ref_016 2024112615512245232_j_jmc-2024-0014_ref_006 2024112615512245232_j_jmc-2024-0014_ref_017 2024112615512245232_j_jmc-2024-0014_ref_007 2024112615512245232_j_jmc-2024-0014_ref_018 2024112615512245232_j_jmc-2024-0014_ref_011 2024112615512245232_j_jmc-2024-0014_ref_022 2024112615512245232_j_jmc-2024-0014_ref_001 2024112615512245232_j_jmc-2024-0014_ref_012 2024112615512245232_j_jmc-2024-0014_ref_023 2024112615512245232_j_jmc-2024-0014_ref_002 2024112615512245232_j_jmc-2024-0014_ref_013 2024112615512245232_j_jmc-2024-0014_ref_003 2024112615512245232_j_jmc-2024-0014_ref_014 2024112615512245232_j_jmc-2024-0014_ref_020 2024112615512245232_j_jmc-2024-0014_ref_010 2024112615512245232_j_jmc-2024-0014_ref_021 |
References_xml | – ident: 2024112615512245232_j_jmc-2024-0014_ref_002 doi: 10.1109/ICITA.2005.33 – ident: 2024112615512245232_j_jmc-2024-0014_ref_021 doi: 10.1142/5683 – ident: 2024112615512245232_j_jmc-2024-0014_ref_015 doi: 10.1016/S0012-365X(02)00754-9 – ident: 2024112615512245232_j_jmc-2024-0014_ref_010 doi: 10.1090/conm/616/12301 – ident: 2024112615512245232_j_jmc-2024-0014_ref_017 doi: 10.3934/math.2023885 – ident: 2024112615512245232_j_jmc-2024-0014_ref_007 doi: 10.1080/23799927.2020.1862303 – ident: 2024112615512245232_j_jmc-2024-0014_ref_016 doi: 10.3390/app12157401 – ident: 2024112615512245232_j_jmc-2024-0014_ref_009 doi: 10.1515/jmc-2019-0061 – ident: 2024112615512245232_j_jmc-2024-0014_ref_018 – ident: 2024112615512245232_j_jmc-2024-0014_ref_004 doi: 10.1515/jmc-2016-0064 – ident: 2024112615512245232_j_jmc-2024-0014_ref_013 doi: 10.1016/0165-0114(84)90026-5 – ident: 2024112615512245232_j_jmc-2024-0014_ref_008 doi: 10.1080/00927872.2021.1975125 – ident: 2024112615512245232_j_jmc-2024-0014_ref_014 – ident: 2024112615512245232_j_jmc-2024-0014_ref_019 doi: 10.1016/S0165-0114(01)00108-7 – ident: 2024112615512245232_j_jmc-2024-0014_ref_006 doi: 10.1080/00927872.2019.1581213 – ident: 2024112615512245232_j_jmc-2024-0014_ref_011 doi: 10.1016/j.fss.2014.11.008 – ident: 2024112615512245232_j_jmc-2024-0014_ref_012 – ident: 2024112615512245232_j_jmc-2024-0014_ref_003 doi: 10.1080/00927872.2013.766827 – ident: 2024112615512245232_j_jmc-2024-0014_ref_005 doi: 10.21136/AM.2020.0325-19 – ident: 2024112615512245232_j_jmc-2024-0014_ref_020 – ident: 2024112615512245232_j_jmc-2024-0014_ref_001 doi: 10.1109/TIT.1976.1055638 – ident: 2024112615512245232_j_jmc-2024-0014_ref_022 doi: 10.1016/S0167-6377(02)00159-1 – ident: 2024112615512245232_j_jmc-2024-0014_ref_023 |
SSID | ssj0067881 |
Score | 2.3182569 |
Snippet | Given that the tropical Stickel protocol and its variants are all vulnerable to the generalized Kotov–Ushakov attack, we suggest employing the max-min semiring... |
SourceID | doaj proquest crossref walterdegruyter |
SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 644 |
SubjectTerms | 08A72 15A80 94A60 cryptographic attack fuzzy algebra fuzzy relation equations public key cryptography Rings (mathematics) Stickel protocol |
SummonAdditionalLinks | – databaseName: Scholars Portal Journals: Open Access dbid: M48 link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3Nb9MwFLdgXOBQbcC0sjL5gOCCoU4cOzkgtCGmCqlwYJV6i_w5FZqUNa3W_fe85yadBuPGLUqeLed9xL8X279HyKuQKi2UskxLlTB0ElbkmWAGUgFAC05lEk8jj7_K0UR8mWbTW0qhVoHNvakd1pOaLOfvNlc3HyHgP8TqPTx7_6OyYOxEMMT7D8kjmJQUxuhY7BYUJLKmtxSbfzW5MyVF5v47cLN3HReunb9crm9W3UJpnH_O90mvBY70dGvpA_LA10_Jk_GOdbV5Ribfajqrug3hqHG6CPQ7PPzp528aCvFK_WZ71JciQcMCvIDiHk5a6Q2rZjXVtYvXF7Tx1Qz_-TXPyeT888WnEWvLJjAreLFiWmVeeyVdrozkPvFWG-XzzPHc6KFEwj-VR-xjLQ_agBg0CS5wYXVmkvSQ7NWL2h8RCh8AZQK3yhRBJNCPAfRihcuDTBPorU_edporbcspjqUt5iXmFqDoEhRdoqJx75zok9c78V9bMo1_CZ6hGXZCyIEdbyyWl2UbUqWQadCqcN4YJ2w-NABWbWY4vKExPOV9MuiMWHZ-VaZcFgji0mGf8D8Meyt176AAC734H-M6Jo-j63HOEjkge6vl2r8EZLMyJ9FnfwNvRPga priority: 102 providerName: Scholars Portal |
Title | On implementation of Stickel's key exchange protocol over max-min and max-T semirings |
URI | https://www.degruyter.com/doi/10.1515/jmc-2024-0014 https://www.proquest.com/docview/3169615130 https://doaj.org/article/463fa79debbd4c80b192c5b1623bb131 |
Volume | 18 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NT9wwELUQp3JAlIJYCsiHqlywWCeOnRwBFaFK2x5gJW6RP9ECyVZkUZd_z4yTLGwF4tJLFCUTy5oZZ97Y42dCvoVUaaGUZVqqhKGTsCLPBDOQCgBacCqTuBt59EtejMXP6-z61VFfWBPW0gO3ijsWMg1aFc4b44TNhwYgic0Mh7BtDI87qBOIeX0y1f6DJZKkd4yaELCPbysL7pAIhhnBUgSKRP1L6HL9b1yndv7m4fFp1q-LxnBzvkHWO5xIT9r-fSYrvt4ka6MFyWrzhYx_13RS9fXfqGA6DfQSXt75-8OGwvCkft7u7KXIxzAFo1Ms2aSVnrNqUlNdu3h_RRtfTXCKr9ki4_MfV2cXrDslgVnBixnTKvPaK-lyZST3ibfaKJ9njudGDyXy-6k8Qh1redAGxOCT4AIXVmcmSbfJaj2t_Q6hMN6VCdwqUwSRQDsGwIoVLg8yTaC1ATnqNVfajkIcT7K4LzGVAEWXoOgSFY2lcmJAvi_E_7TcGe8JnqIZFkJIeR0fgCOUnSOUHznCgOz1Riy7cdiUKZcFYrZ0OCD8H8O-SL3ZKYA-u_-jX1_Jp-h6nLNE7pHV2cOj3wcgMzMH0WfhOhL5M2Io8iI |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwEB5B9wAcVjxFYQEfEFywWieOnRwXxFJgu3vYVuIW-blbaBLUpGL594zTJLA8LtyiZMZy5hF_dsafAZ77WCoupaFKyIiGIKFZmnCqcSqAaMHKRITdyPMTMVvyD5-Svpqw7soqrTvfbL83O4bUia3MNiyUDVwDOAJPPhcG_RtxGiD-5KIp1tdhTyD4T0ewdzh7d3baf45F4EvvyDX_0LwyGLWc_VeA5v639pf10J9fRp6j27DfQUZyuPPxHbjmyrtwaz7wrdb3YHlaklXRl4IHW5PKkzN8-MWtX9YEM5W4y90mXxKoGSr0PwnVm6RQl7RYlUSVtr1ekNoVq7DaV9-H5dHbxZsZ7Q5MoIazrKFKJk45KWwqtWAuckZp6dLEslSrqQhUfzJtUY8xzCuNYqjirWfcqERH8QMYlVXpHgLB1JfaMyN15nmE7WjELYbb1Is4wtbG8Kq3XG46NvFwqMU6D7MKNHSOhs6DoUPVHB_Di0H8645G41-Cr4MbBqHAft3eqDbneZdMORexVzKzTmvLTTrVCFNNohm-odYsZmM46J2YdylZ5zETWYBv8XQM7DfH_pT6a6cQBT36D51ncGO2mB_nx-9PPj6Gm23UMUYjcQCjZrN1TxDONPppF7A_AKoJ8uc |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Jb9QwFH6CqYTgULGKaQv4gOCCNePEsZNjWYZhaYvUjtSb5bUaaJJqMiPKv-c5kwkty4VblDxbzlvyPjvPnwGeh1RqLqWlWsiERiehRZ5xanAqgGjByUzE3cgHh2I64x9Ps9Mru_hjWaXzZ4vVj-WaIXXkaruKC2U91wBm4NHX0qJ9E04jxB9duHATtoQoUj6Arf3p--OjzddYRLr0jlvzj4bXclFL2X8NZ25_b_9Y98O5kngmd2G7Q4xkf23ie3DDV_fhzkFPt9o8gNlRReblphI8qprUgRzjw2_-_GVDMFCJv1zv8SWRmaFG85NYvElKfUnLeUV05drrE9L4ch4X-5qHMJu8O3kzpd15CdRyViyplpnXXgqXSyOYT7zVRvo8cyw3eiwi05_MW9BjLQvaoBg2CS4wbnVmkvQRDKq68o-BYORLE5iVpgg8wX4MwhbLXR5EmmBvQ3i10ZyyHZl4PNPiXMVJBSpaoaJVVHQsmuNDeNGLX6xZNP4l-DqaoReK5NftjXpxprpYUlykQcvCeWMct_nYIEq1mWH4hsawlA1hb2NE1UVko1Imioje0vEQ2G-G_SX110EhCNr5jzbP4NaXtxP1-cPhp1243TodYzQRezBYLlb-CYKZpXna-etPNXfyDQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=On+implementation+of+Stickel%27s+key+exchange+protocol+over+max-min+and+max-T+semirings&rft.jtitle=Journal+of+mathematical+cryptology&rft.au=Alhussaini+Sulaiman&rft.au=Sergeev+Serge%C4%AD&rft.date=2024-11-26&rft.pub=De+Gruyter&rft.eissn=1862-2984&rft.volume=18&rft.issue=1&rft.spage=644&rft.epage=54&rft_id=info:doi/10.1515%2Fjmc-2024-0014&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_463fa79debbd4c80b192c5b1623bb131 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1862-2984&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1862-2984&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1862-2984&client=summon |