Investigation of Matrix Power Asymmetric Cipher Resistant to Linear Algebra Attack
This paper continues our research of the so-called matrix power function and its application to cryptography. We consider the simplest case of the improved matrix power asymmetric cypher (MPAC). We show that our protocol is resistant to linear algebra attack, which can be applied to the initial vers...
Saved in:
Published in | Information and Software Technologies pp. 197 - 208 |
---|---|
Main Authors | , |
Format | Book Chapter |
Language | English |
Published |
Cham
Springer International Publishing
|
Series | Communications in Computer and Information Science |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper continues our research of the so-called matrix power function and its application to cryptography. We consider the simplest case of the improved matrix power asymmetric cypher (MPAC). We show that our protocol is resistant to linear algebra attack, which can be applied to the initial version of MPAC to break it in polynomial time. Our main goal is to present the general idea for the choice of public parameters of MPAC protocol to avoid this attack while also avoiding exhaustive search attack. |
---|---|
AbstractList | This paper continues our research of the so-called matrix power function and its application to cryptography. We consider the simplest case of the improved matrix power asymmetric cypher (MPAC). We show that our protocol is resistant to linear algebra attack, which can be applied to the initial version of MPAC to break it in polynomial time. Our main goal is to present the general idea for the choice of public parameters of MPAC protocol to avoid this attack while also avoiding exhaustive search attack. |
Author | Mihalkovich, Aleksejus Levinskas, Matas |
Author_xml | – sequence: 1 givenname: Aleksejus orcidid: 0000-0002-8661-3021 surname: Mihalkovich fullname: Mihalkovich, Aleksejus email: aleksejus.michalkovich@ktu.lt organization: Kaunas University of Technology, Kaunas, Lithuania – sequence: 2 givenname: Matas surname: Levinskas fullname: Levinskas, Matas email: matas.levinskas@ktu.edu organization: Kaunas University of Technology, Kaunas, Lithuania |
BookMark | eNpVkNtKAzEQhqNWsNa-gRd5gegk2c3hshSthYpS9Dpkt9ka2yZlEzy8vamK4MzFwPcPw_Cdo0GIwSF0SeGKAshrLRXhBDgQDkzWRBoqjtC4YA6HLkweoyFVoiaguTz5l1Uw-MuYPkPjlF6hVK1A6XqIlvPw5lL2a5t9DDh2-N7m3n_gx_juejxJn7udK6DFU79_KWTpkk_ZhoxzxAsfnC1b27VreosnOdt2c4FOO7tNbvw7R-j59uZpekcWD7P5dLIgiWqVSaNWArhkwvHymmVV14hK8ZWkrLW6akFT2zLoKG-g7cAC55VqtGBS2doqwUeI_dxN-96HtetNE-MmGQrmIM4UC4abYsF8SzIHcfwLBmRc5w |
ContentType | Book Chapter |
Copyright | Springer Nature Switzerland AG 2019 |
Copyright_xml | – notice: Springer Nature Switzerland AG 2019 |
DOI | 10.1007/978-3-030-30275-7_16 |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9783030302757 303030275X |
EISSN | 1865-0937 |
Editor | Damaševičius, Robertas Vasiljevienė, Giedrė |
Editor_xml | – sequence: 1 givenname: Robertas surname: Damaševičius fullname: Damaševičius, Robertas email: robertas.damasevicius@ktu.lt – sequence: 2 givenname: Giedrė surname: Vasiljevienė fullname: Vasiljevienė, Giedrė email: giedre.vasiljeviene@ktu.lt |
EndPage | 208 |
GroupedDBID | 38. 9-X AABBV AEJLV AEKFX AIFIR ALMA_UNASSIGNED_HOLDINGS AYMPB BBABE CXBFT CZZ EXGDT FCSXQ I4C IEZ MGZZY NSQWD OORQV SBO SNUHX TPJZQ Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z82 Z83 Z84 Z85 Z87 Z88 |
ID | FETCH-LOGICAL-s198t-b8d603726e3092a24fb6483d712ca94c091ac20f13b0cf0a03348b96278a5a863 |
ISBN | 9783030302740 3030302741 |
ISSN | 1865-0929 |
IngestDate | Tue Oct 01 19:50:28 EDT 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-s198t-b8d603726e3092a24fb6483d712ca94c091ac20f13b0cf0a03348b96278a5a863 |
ORCID | 0000-0002-8661-3021 |
PageCount | 12 |
ParticipantIDs | springer_books_10_1007_978_3_030_30275_7_16 |
PublicationPlace | Cham |
PublicationPlace_xml | – name: Cham |
PublicationSeriesTitle | Communications in Computer and Information Science |
PublicationSeriesTitleAlternate | Communic.Comp.Inf.Science |
PublicationSubtitle | 25th International Conference, ICIST 2019, Vilnius, Lithuania, October 10–12, 2019, Proceedings |
PublicationTitle | Information and Software Technologies |
Publisher | Springer International Publishing |
Publisher_xml | – name: Springer International Publishing |
RelatedPersons | Barbosa, Simone Diniz Junqueira Zhou, Lizhu Kotenko, Igor Filipe, Joaquim Ghosh, Ashish Yuan, Junsong |
RelatedPersons_xml | – sequence: 1 givenname: Simone Diniz Junqueira surname: Barbosa fullname: Barbosa, Simone Diniz Junqueira organization: Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Rio de Janeiro, Brazil – sequence: 2 givenname: Joaquim surname: Filipe fullname: Filipe, Joaquim organization: Polytechnic Institute of Setúbal, Setúbal, Portugal – sequence: 3 givenname: Ashish surname: Ghosh fullname: Ghosh, Ashish organization: Indian Statistical Institute, Kolkata, India – sequence: 4 givenname: Igor surname: Kotenko fullname: Kotenko, Igor organization: St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, St. Petersburg, Russia – sequence: 5 givenname: Junsong surname: Yuan fullname: Yuan, Junsong organization: University at Buffalo, The State University of New York, Buffalo, USA – sequence: 6 givenname: Lizhu surname: Zhou fullname: Zhou, Lizhu organization: Tsinghua University , Beijing, China |
SSID | ssj0000580895 ssj0002287999 ssib054953581 |
Score | 2.1134846 |
Snippet | This paper continues our research of the so-called matrix power function and its application to cryptography. We consider the simplest case of the improved... |
SourceID | springer |
SourceType | Publisher |
StartPage | 197 |
SubjectTerms | Matrix power function Non-commutative cryptography Security analysis |
Title | Investigation of Matrix Power Asymmetric Cipher Resistant to Linear Algebra Attack |
URI | http://link.springer.com/10.1007/978-3-030-30275-7_16 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9swDBbS7rbDuhe2YRt02C3QIFu2LB2DokNRNMMwtENvhuTH2qa1gVrF1v76kZbsOE0v3cUIlMSxSIakKH6fCPkSc2HLupZMaCVYUtUp09IqJoy1EFC4qvtizvK7PDxNjs7Ss9nsfooucfZrcf8oruR_tApjoFdEyT5Bs-NNYQBeg37hChqG64Pkd7PMGtoFR-Bh6L-s3R_s4xqr5ZP-wOXFublateAWzgOsZdVVl7fj-8cQH5tu5dFdS-NCz9DY5z6Scfj0conE_n_nP9q-xb67u77Gg7mK-f4FshTgngCmpY3DzBZWu0gWtLj6jXvU84VzJhDxo4yqbhOj0nkYoj9qIjQrr-cZPNFWWfJBYXNdW9tYx0Ic5biB6pmbgitWMmVch3pINR3zNDHB5Ua-vzdE77hnidgODNNeEPgp1m_XsiyP5A7ZyTT4w2eLg6PjX4MvSrHvdqCG8zzxiquAYb70tEHwNVxdjQ-K0KFhIpEnd1pPbALbfOwptjbi-_zmZI88R8wLRTAKyPElmVXNK_JiUAMNYn9Nfm5YAm1r6i2B9pZA15ZAvSXQ0RKoa6m3BBosgXpLeENOvx2c7B-ycCoH6yKtHLOqlFxksawETNrESW1lokSZRXFhdFJAAoq0n3UkLC9qbjhivS2e8aRMapQUb8lu0zbVO0K10Fi-UBEyFmVwF22LkludlphHG_mezAeh5Pg_6_KBZBtEmIscRJj3IsxRhB-e9OmPZNfd3FafIKV09nPQ_j8lWHEE |
link.rule.ids | 785,786,790,799,27958 |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Information+and+Software+Technologies&rft.au=Mihalkovich%2C+Aleksejus&rft.au=Levinskas%2C+Matas&rft.atitle=Investigation+of+Matrix+Power+Asymmetric+Cipher+Resistant+to+Linear+Algebra+Attack&rft.series=Communications+in+Computer+and+Information+Science&rft.pub=Springer+International+Publishing&rft.isbn=9783030302740&rft.issn=1865-0929&rft.eissn=1865-0937&rft.spage=197&rft.epage=208&rft_id=info:doi/10.1007%2F978-3-030-30275-7_16 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1865-0929&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1865-0929&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1865-0929&client=summon |