A Closer Look at the Tropical Cryptography

11/28/2020
by   Steve Isaac, et al.
0

We examine two public key exchange protocols proposed recently by Grigoriev and Shpilrain (arXiv:1811.06386), which use tropical algebra. We introduce a fast attack on the first protocol, and we show that the second protocol cannot be implemented as described.

READ FULL TEXT
POST COMMENT

Comments

There are no comments yet.

Authors

page 1

page 2

page 3

page 4

12/14/2021

Public key cryptography based on twisted dihedral group algebras

In this paper, we propose to use a twisted dihedral group algebra for pu...
02/08/2021

A Closer Look at the Multilinear Cryptography using Nilpotent Groups

In a previous paper we generalized the definition of a multilinear map t...
11/14/2018

Tropical cryptography II: extensions by homomorphisms

We use extensions of tropical algebras as platforms for very efficient p...
03/13/2018

A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later

The purpose of this paper is to describe and analyze the Cayley-Purser a...
09/01/2021

Graph Automorphism Shuffles from Pile-Scramble Shuffles

A pile-scramble shuffle is one of the most effective shuffles in card-ba...
01/22/2021

Privacy Friendly E-Ticketing For Public Transport

This paper studies how to implement a privacy friendly form of ticketing...
11/10/2021

On the efficiency of a general attack against the MOBS cryptosystem

All instances of the semidirect key exchange protocol, a generalisation ...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.