Log In Sign Up

A model of public key cryptography using multinacci matrices

by   Munesh Kumari, et al.

In this paper, we have proposed a Public Key Cryptography (P KC) using block matrices with generalized Fibonacci sequence. First, we have shown the multiplicative commutativity of generalized matrices which are constructed using generalized Fibonacci sequences and then we develop a cryptographical scheme. We also discuss the efficiency and strength of proposed scheme in context of block matrices.


page 1

page 2

page 3

page 4


A novel public key cryptography based on generalized Lucas matrices

In this article, we have proposed a generalized Lucas matrix (recursive ...

Cryptography using generalized Fibonacci matrices with Affine-Hill cipher

In this article, we have proposed a public key cryptography using Affine...

Breaking the Hidden Irreducible Polynomials Scheme

In 2019 Gómez described a new public key cryptography scheme based on id...

On the role of the Fibonacci matrix as key in modified ECC

In this paper, we have proposed a modified cryptographic scheme based on...

Smaller Keys for Code-Based Cryptography: McEliece Cryptosystems with Convolutional Encoders

In this paper we present a novel class of convolutional codes and invest...

The Fifth International Students' Olympiad in Cryptography -- NSUCRYPTO: problems and their solutions

Problems and their solutions of the Fifth International Students' Olympi...

1 Introduction

Information is one of the most valuable assets since the dawn of civilizations. The secured transmission of information is of prime importance. Cryptography is the science of study about the security, privacy, and confidentiality of information transmitted over a secured channel. Although many encryption-decryption schemes exist but the need for new nonstandard encryption algorithms raises to prevent any traditional opportunities to steal or change the information. Also reducing the time and space complexity of key generation with enhancement in security so that it is difficult for an intruder to steal or change the information becomes a need for today’s time..

The problem concerned to the topic is to develop a model of public key cryptography with the following parameters:

  • Reduction in complexity for key generation.

  • Enhancement of security in the transmission of information.

As an example, for the same level of security, the RSA cryptosystem uses a bigger key size than the key size of Elliptic curve cryptography.
There is a need for finding one model which has the least complexity but maximum possible security.

In 1976, Diffie and Hellman [2] provided a solution to the long-standing problem of key exchange and pointed the way to digital signature. In 1978 Rivest, Shamir & Adleman[9] proposed a public key cryptosystem which famed as RSA cryptosystem. The security of RSA cryptosystem depends on the difficulty level of factoring large integers.
R.ALVAREZA,[1] proposed a public key cryptosystem (PKC) based on the generalization of the discrete logarithm problem for block matrices over the field with reduced key length for a given level of security. Kuppuswamy, [8] has given two different encryption algorithms; One is public key cryptography based on a linear block cipher and the second one is private key cryptography based on a simple symmetric algorithm . Viswanath and Kumar[12] proposed a public key cryptosystem using Hill’s cipher, in which security of the system depends on the involvement of two digital signatures.

M. Zeriouh, [13], proposed the concept of key exchange between Alice and Bob using specially designed matrices. In this key exchange scheme, each of the sender and receiver first chooses a square matrix of suitable order and then both publish their corresponding set of matrices which commute with their corresponding chosen matrices.

In this paper, we propose a modified key exchange scheme and public key cryptography based on generalized Fibonacci matrices and affine-hill cipher. In this proposed scheme, the time complexity of key matrix generation is reduced to . The security of our scheme depends on the discrete logarithm problem. So our proposed scheme is secure against various known attacks.
This paper is organized as follows. In section 2, the basic concepts of Affine Cipher, generalized matrices and block matrices are outlined. In section 3, we have shown commutativity of the generalized Fibonacci matrices and developed public key cryptography. In section 4, we have described an example of proposed scheme. Finally in section 5, we present the crypt-analytic strength of model.

2 Preliminaries

Definition 2.1 (Affine-Hill Cipher).

Affine-Hill Cipher is defined as:


where P, C & K represents plaintext, ciphertext & key matrix respectively and is a prime with .

2.1 Generalization of Fibonacci sequence and Fibonacci matrix

Definition 2.2 (Fibonacci Sequence).

Fibonacci Sequence is defined by the recurrence relation


and the terms of this sequence are called Fibonacci numbers.

Note that, the Fibonacci sequence can also be extended in negative direction [5, 7] .
Fibonacci Matrix: Fibonacci Matrix was first used by Brenner and it’s basic properties were enumerated by King [6]. In 1985, Honsberger [4] showed that the Fibonacci matrix F is a square matrix of order 22 of the form and it’s power is defined as


In notation, here we use instead of and in general instead of for .

Generalization of Fibonacci matrix

Definition 2.3.

The generalized Fibonacci sequence of order is defined by the recurrence relation


with and .

It can also be stated as multinacci sequence [5].
In particular, for , relation (2.5) is Fibonacci sequence[A000045] and for , (2.5) is called tribonacci sequence [5, 7][A000073].
The generalized Fibonacci matrix of order n is given by

and power of is given by
,   for
where ,    

is identity matrix of order of n.

2.2 Block Matrices

Definition 2.4 (Block Matrix).

Let and are square matrix of order , then we define block matrix as,

Properties of the block matrices

Let and are square matrix of order and . Then some properties of block matrices discussed by M. Zeriouh, [13] are given as follow,

  1.  , where


    which can also be seen as .

  2. .

  3. .

Lemma 2.1.

Matrix if and .

3 Main Work

Lemma 3.1.

Generalized Fibonacci matrices commute with each other i.e. if and are two generalized matrices for some then =.


We prove this lemma by mathematical induction on and fixing .
For, ,




Thus,from equation(3.1) and (3.2),


Therefore result holds for .
Assume that the statement is true for ,


Then for ,

So, result is true for .
Hence, by the principal of mathematical induction,result is true for every .
Here, we see that generalized Fibonacci matrix commute with each other. ∎

Hence satisfy lemma(2.1).

3.1 Key Generation Algorithm

Let the set ={ is a generalized Fibonacci matrix, }.

Construction of public key:

  1. [label=.]

  2. Alice chooses a prime number , and matrices .

  3. Calculate

    Here, is Alice’s public key and is her secret key.

Key Generation and Encryption:

Using Alice’s public key , Bob will generate first encryption key and then encrypts his plaintext as follows:

  1. [label=.]

  2. Bob choose his secret key and .

  3. Calculate as

  4. Further,

    Thus, encryption key (say .

  5. Calculate B, where B is a row vector in

    whose column is the sum of elements of column of E .

  6. Encryption takes place as,

  7. Bob sends to Alice.


After receiving from Bob, Alice perform following operations to recover plaintext:

  1. [label=.]

  2. Alice first calculate key matrix as,

  3. Thus, decryption key (say D) = .

  4. Decryption of ciphertext

    where B is a row vector whose column is the sum of elements of coloumn of in .

4 Example

Example 1.

Let prime p=47 and is a generalized Fibonacci matrix of order 3, . Encrypt the plaintext HEY.

Construction of Public Key:

(i). Suppose Alice’s secret key , secret matrices and public matrix are


(ii). Construction of public key,

Thus, here Alice’s public Key is and
Alice’s secret key is .

Key Generation and Encryption:

Bob generate encryption key using Alice’s public key , and encrypt his plaintext as follows:

  1. .       

  2. Bob chooses his secret number, say m=3 and secret matrices , which are

  3. Calculation of ,

  4. Calculation of encryption key,

    So, encryption key .

  5. Row vector B over , .

  6. Encryption: .

    [  Z  P].
    Here, plaintext encrypted as .

  7. Bob sends = to Alice.


After receiving , Alice recover plaintext as

  1. First calculate key matrix as

  2. Decryption key, D = .

  3. Decryption:

  4. [36  25  15] and row vector .
    Now recovering the plaintext according to (4.3), we have

    Thus, Alice recovers from successfully.

5 Complexity of Key matrix

In our work, time complexity [11] of generating key matrix using equation(2.6) is reduced to


where, , and .
So time complexity of construction is reduced to . Security strength of proposed method depends upon the private keys of sender and receiver . Since, it is almost impossible to recover from because there is no any determinastic algorithm (Discrete logarithm problem [3, 10]) even intruder knows the matrix .

6 Conclusion

Here we have proposed public key cryptography and modification in key exchange method discussed in paper [zeriouh2019cryptography] using generalized Fibonacci matrices. We have used commutative property of generalized Fibonacci matrices to reduce complexity of construction. In above proposed scheme, neither sender nor receiver need to publish their corresponding set of matrices which commute with chosen matrix of sender and receiver respectively. Also our proposed scheme is secured against various known attacks. So, Our method is quite robust and can be implemented easily.

7 Acknowledgment

First author would like to thank University Grant Commission, India for financial support. The authors are grateful to Central University of Jharkhand, India for kind support.


  • [1] ALVAREZ, R., MARTINEZ, F.-M., VICENT, J.-F., AND ZAMORA, A. A new public key cryptosystem based on matrices. WSEAS Information Security and Privacy (2007), 36–39.
  • [2] DIFFIE, W., AND HELLMAN, M. New directions in cryptography. IEEE transactions on Information Theory 22, 6 (1976), 644–654.
  • [3] HOFFSTEIN, J., PIPHER, J., SILVERMAN, J. H., AND SILVERMAN, J. H. An introduction to mathematical cryptography, vol. 1. Springer, 2008.
  • [4] HONSBERGER, R. Mathematical gems iii, dolciani math, 1985.
  • [5] JOHNSON, R. C. Fibonacci numbers and matrices. manuscript available at http://www. dur. ac. uk/bob. johnson/fibonacci (2008).
  • [6] KING, C. Some further properties of the fibonacci numbers. San Jose: CA (1960).
  • [7] KOSHY, T. Fibonacci and Lucas numbers with applications. John Wiley & Sons, 2019.
  • [8] KUPPUSWAMY, P., AND AL-KHALIDI, S. Q. Hybrid encryption/decryption technique using new public key and symmetric key algorithm. MIS Review: An International Journal 19, 2 (2014), 1–13.
  • [9] RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 2 (1978), 120–126.
  • [10] STINSON, D. R. Cryptography: theory and practice. Chapman and Hall/CRC, 2005.
  • [11] STOTHERS, A. J. On the complexity of matrix multiplication, The University of Edinburgh (2010).
  • [12] VISWANATH, M., AND KUMAR, M. R. A public key cryptosystem using hiil’s cipher. Journal of Discrete Mathematical Sciences and Cryptography 18, 1-2 (2015), 129– 138.
  • [13] ZERIOUH, M., CHILLALI, A., AND BOUA, A. Cryptography based on the matrices. Boletim da Sociedade Paranaense de Matematica 37 , 3 (2019), 75–83.