Investigation of Matrix Power Asymmetric Cipher Resistant to Linear Algebra Attack

This paper continues our research of the so-called matrix power function and its application to cryptography. We consider the simplest case of the improved matrix power asymmetric cypher (MPAC). We show that our protocol is resistant to linear algebra attack, which can be applied to the initial vers...

Full description

Saved in:
Bibliographic Details
Published inInformation and Software Technologies pp. 197 - 208
Main Authors Mihalkovich, Aleksejus, Levinskas, Matas
Format Book Chapter
LanguageEnglish
Published Cham Springer International Publishing
SeriesCommunications in Computer and Information Science
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This paper continues our research of the so-called matrix power function and its application to cryptography. We consider the simplest case of the improved matrix power asymmetric cypher (MPAC). We show that our protocol is resistant to linear algebra attack, which can be applied to the initial version of MPAC to break it in polynomial time. Our main goal is to present the general idea for the choice of public parameters of MPAC protocol to avoid this attack while also avoiding exhaustive search attack.
AbstractList This paper continues our research of the so-called matrix power function and its application to cryptography. We consider the simplest case of the improved matrix power asymmetric cypher (MPAC). We show that our protocol is resistant to linear algebra attack, which can be applied to the initial version of MPAC to break it in polynomial time. Our main goal is to present the general idea for the choice of public parameters of MPAC protocol to avoid this attack while also avoiding exhaustive search attack.
Author Mihalkovich, Aleksejus
Levinskas, Matas
Author_xml – sequence: 1
  givenname: Aleksejus
  orcidid: 0000-0002-8661-3021
  surname: Mihalkovich
  fullname: Mihalkovich, Aleksejus
  email: aleksejus.michalkovich@ktu.lt
  organization: Kaunas University of Technology, Kaunas, Lithuania
– sequence: 2
  givenname: Matas
  surname: Levinskas
  fullname: Levinskas, Matas
  email: matas.levinskas@ktu.edu
  organization: Kaunas University of Technology, Kaunas, Lithuania
BookMark eNpVkNtKAzEQhqNWsNa-gRd5gegk2c3hshSthYpS9Dpkt9ka2yZlEzy8vamK4MzFwPcPw_Cdo0GIwSF0SeGKAshrLRXhBDgQDkzWRBoqjtC4YA6HLkweoyFVoiaguTz5l1Uw-MuYPkPjlF6hVK1A6XqIlvPw5lL2a5t9DDh2-N7m3n_gx_juejxJn7udK6DFU79_KWTpkk_ZhoxzxAsfnC1b27VreosnOdt2c4FOO7tNbvw7R-j59uZpekcWD7P5dLIgiWqVSaNWArhkwvHymmVV14hK8ZWkrLW6akFT2zLoKG-g7cAC55VqtGBS2doqwUeI_dxN-96HtetNE-MmGQrmIM4UC4abYsF8SzIHcfwLBmRc5w
ContentType Book Chapter
Copyright Springer Nature Switzerland AG 2019
Copyright_xml – notice: Springer Nature Switzerland AG 2019
DOI 10.1007/978-3-030-30275-7_16
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9783030302757
303030275X
EISSN 1865-0937
Editor Damaševičius, Robertas
Vasiljevienė, Giedrė
Editor_xml – sequence: 1
  givenname: Robertas
  surname: Damaševičius
  fullname: Damaševičius, Robertas
  email: robertas.damasevicius@ktu.lt
– sequence: 2
  givenname: Giedrė
  surname: Vasiljevienė
  fullname: Vasiljevienė, Giedrė
  email: giedre.vasiljeviene@ktu.lt
EndPage 208
GroupedDBID 38.
9-X
AABBV
AEJLV
AEKFX
AIFIR
ALMA_UNASSIGNED_HOLDINGS
AYMPB
BBABE
CXBFT
CZZ
EXGDT
FCSXQ
I4C
IEZ
MGZZY
NSQWD
OORQV
SBO
SNUHX
TPJZQ
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z82
Z83
Z84
Z85
Z87
Z88
ID FETCH-LOGICAL-s198t-b8d603726e3092a24fb6483d712ca94c091ac20f13b0cf0a03348b96278a5a863
ISBN 9783030302740
3030302741
ISSN 1865-0929
IngestDate Tue Oct 01 19:50:28 EDT 2024
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s198t-b8d603726e3092a24fb6483d712ca94c091ac20f13b0cf0a03348b96278a5a863
ORCID 0000-0002-8661-3021
PageCount 12
ParticipantIDs springer_books_10_1007_978_3_030_30275_7_16
PublicationPlace Cham
PublicationPlace_xml – name: Cham
PublicationSeriesTitle Communications in Computer and Information Science
PublicationSeriesTitleAlternate Communic.Comp.Inf.Science
PublicationSubtitle 25th International Conference, ICIST 2019, Vilnius, Lithuania, October 10–12, 2019, Proceedings
PublicationTitle Information and Software Technologies
Publisher Springer International Publishing
Publisher_xml – name: Springer International Publishing
RelatedPersons Barbosa, Simone Diniz Junqueira
Zhou, Lizhu
Kotenko, Igor
Filipe, Joaquim
Ghosh, Ashish
Yuan, Junsong
RelatedPersons_xml – sequence: 1
  givenname: Simone Diniz Junqueira
  surname: Barbosa
  fullname: Barbosa, Simone Diniz Junqueira
  organization: Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Rio de Janeiro, Brazil
– sequence: 2
  givenname: Joaquim
  surname: Filipe
  fullname: Filipe, Joaquim
  organization: Polytechnic Institute of Setúbal, Setúbal, Portugal
– sequence: 3
  givenname: Ashish
  surname: Ghosh
  fullname: Ghosh, Ashish
  organization: Indian Statistical Institute, Kolkata, India
– sequence: 4
  givenname: Igor
  surname: Kotenko
  fullname: Kotenko, Igor
  organization: St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences, St. Petersburg, Russia
– sequence: 5
  givenname: Junsong
  surname: Yuan
  fullname: Yuan, Junsong
  organization: University at Buffalo, The State University of New York, Buffalo, USA
– sequence: 6
  givenname: Lizhu
  surname: Zhou
  fullname: Zhou, Lizhu
  organization: Tsinghua University , Beijing, China
SSID ssj0000580895
ssj0002287999
ssib054953581
Score 2.1134846
Snippet This paper continues our research of the so-called matrix power function and its application to cryptography. We consider the simplest case of the improved...
SourceID springer
SourceType Publisher
StartPage 197
SubjectTerms Matrix power function
Non-commutative cryptography
Security analysis
Title Investigation of Matrix Power Asymmetric Cipher Resistant to Linear Algebra Attack
URI http://link.springer.com/10.1007/978-3-030-30275-7_16
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9swDBbS7rbDuhe2YRt02C3QIFu2LB2DokNRNMMwtENvhuTH2qa1gVrF1v76kZbsOE0v3cUIlMSxSIakKH6fCPkSc2HLupZMaCVYUtUp09IqJoy1EFC4qvtizvK7PDxNjs7Ss9nsfooucfZrcf8oruR_tApjoFdEyT5Bs-NNYQBeg37hChqG64Pkd7PMGtoFR-Bh6L-s3R_s4xqr5ZP-wOXFublateAWzgOsZdVVl7fj-8cQH5tu5dFdS-NCz9DY5z6Scfj0conE_n_nP9q-xb67u77Gg7mK-f4FshTgngCmpY3DzBZWu0gWtLj6jXvU84VzJhDxo4yqbhOj0nkYoj9qIjQrr-cZPNFWWfJBYXNdW9tYx0Ic5biB6pmbgitWMmVch3pINR3zNDHB5Ua-vzdE77hnidgODNNeEPgp1m_XsiyP5A7ZyTT4w2eLg6PjX4MvSrHvdqCG8zzxiquAYb70tEHwNVxdjQ-K0KFhIpEnd1pPbALbfOwptjbi-_zmZI88R8wLRTAKyPElmVXNK_JiUAMNYn9Nfm5YAm1r6i2B9pZA15ZAvSXQ0RKoa6m3BBosgXpLeENOvx2c7B-ycCoH6yKtHLOqlFxksawETNrESW1lokSZRXFhdFJAAoq0n3UkLC9qbjhivS2e8aRMapQUb8lu0zbVO0K10Fi-UBEyFmVwF22LkludlphHG_mezAeh5Pg_6_KBZBtEmIscRJj3IsxRhB-e9OmPZNfd3FafIKV09nPQ_j8lWHEE
link.rule.ids 785,786,790,799,27958
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Information+and+Software+Technologies&rft.au=Mihalkovich%2C+Aleksejus&rft.au=Levinskas%2C+Matas&rft.atitle=Investigation+of+Matrix+Power+Asymmetric+Cipher+Resistant+to+Linear+Algebra+Attack&rft.series=Communications+in+Computer+and+Information+Science&rft.pub=Springer+International+Publishing&rft.isbn=9783030302740&rft.issn=1865-0929&rft.eissn=1865-0937&rft.spage=197&rft.epage=208&rft_id=info:doi/10.1007%2F978-3-030-30275-7_16
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1865-0929&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1865-0929&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1865-0929&client=summon