A Novel Provably Secure Key Agreement Protocol Based On Binary Matrices

04/09/2021
by   Abdelhaliem Babiker, et al.
0

In this paper, a new key agreement protocol is presented. The protocol uses exponentiations of matrices over GF(2) to establish the key agreement in only single step of message exchange. Security analysis of the protocol shows that the shared secret key is indistinguishable from the random under Decisional Diffie-Hellman (DDH) Assumption for subgroup of matrices over GF(2) with prime order, and furthermore, the analysis shows that, unlike many other exponentiation based protocols, security of the protocol goes beyond the level of security provided by (DDH) Assumption and intractability of Discrete Logarithm Problem (DLP). Actually, security of the protocol completely transcends the reliance on the DLP in the sense that breaking the DLP does not mean breaking the protocol. Complexity of brute force attack on the protocol is equivalent to exhaustive search for the secret key. Analysis of the performance demonstrates that the protocol is applicable to real-time applications.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset

Sign in with Google

×

Use your Google Account to sign in to DeepAI

×

Consider DeepAI Pro