Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices
نویسندگان
چکیده
Recently, public-key cryptography based on tropical semi-rings have been proposed. However, the majority of them are damaged. The main reason is that they use a public matrix to construct commutative semi-rings. New cryptosystems proposed in this paper. They congruent transformation symmetric by circular matrix. NP-hard problem solving system nonlinear equations underlies cryptosystem’s security. Since known cannot express used subsemi-rings matrices and there no addition operation power matrix, can withstand attacks, including KU attack, RM IK attack. length key private new half those described literature.
منابع مشابه
Chaos-Based Symmetric Key Cryptosystems
Chaos theory is the study of dynamical systems that are highly sensitive to initial conditions and exhibit seemingly random behavior. From the perspective of cryptography and information security, randomness generated from entirely deterministic systems is a very appealing property. As such, the application of chaos in modern cryptography has been a topic of much research and debate for over a ...
متن کاملNovel orbit based symmetric cryptosystems
During the last few years considerable effort has been devoted to research related to chaotic encryption. In this paper a new symmetric key cryptosystem that exploits the idea of nonlinear mappings and their fixed points to encrypt information is presented. Furthermore, a measure of the quality of the keys used is introduced. The experimental results indicate that the proposed cryptosystem is e...
متن کاملProperties of Central Symmetric X-Form Matrices
In this paper we introduce a special form of symmetric matrices that is called central symmetric $X$-form matrix and study some properties, the inverse eigenvalue problem and inverse singular value problem for these matrices.
متن کاملThree notions of tropical rank for symmetric matrices
We introduce and study three different notions of tropical rank for symmetric matrices and dissimilarity matrices in terms of minimal decompositions into rank 1 symmetric matrices, star tree matrices, and tree matrices. Our results provide a close study of the tropical secant sets of certain nice tropical varieties, including the tropical Grassmannian. In particular, we determine the dimension ...
متن کاملSymmetric Cryptosystems and Symmetric Key Management
Since the earliest days of necessity for secret transmission of messages, which date back to thousands years BCE, different methods have been used to transfer the message between two parties. These days, systematic ways for transmitting secret information are used, and the fear of cracking the message is increasing with the development of breaking algorithms for different encryption techniques....
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Symmetry
سال: 2022
ISSN: ['0865-4824', '2226-1877']
DOI: https://doi.org/10.3390/sym14112378