Public Key Cryptosystem Based on Singular Matrix

Authors

  • Maxrizal Institut Sains Dan Bisnis Atma Luhur, Pangkalpinang, Indonesia

DOI:

https://doi.org/10.48048/tis.2022.2147

Keywords:

Singular matrix key, Public key cryptosystem, Non-commutative singular, Non-commutative algebra, Singular private key

Abstract

The algorithms such as RSA, ElGamal and ECC work on integers. Commutative operations on integer multiplication leave these algorithms vulnerable to attack by eavesdroppers. For this reason, experts develop the concept of non-commutative algebra in the public key cryptosystem by adding non-commutative properties to groups, semirings, semiring division, matrices and matrix decomposition. However, the key generating process in some public key cryptosystems is quite complicated to carry out. Therefore, in previous research, Liu used nonsingular matrices to form a simpler public key cryptosystem. However, eavesdroppers use the inverse of nonsingular matrices to construct the private key. As a result, this public key cryptosystem is still vulnerable to attacks. Therefore, we use a singular matrix to modify and build the proposed public key cryptosystem in this study. This study indicates that the singular matrix can be used to modify the public key cryptosystem. The results also show that the key generating algorithm only uses ordinary matrix multiplication (without using matrix power operations), so it is not too complicated. Furthermore, the proposed public key cryptosystem works on a matrix over integers so that the possible brute force attack trials are endless. The proposed public key cryptosystem also cannot be attacked by matrix inversion because it uses a singular matrix.

HIGHLIGHTS

  • Public key cryptosystems that use commutative operations are vulnerable to eavesdropping attacks
  • This study uses a singular matrix to modify and build a public key cryptosystem
  • The proposed public key cryptosystem works on ordinary matrix multiplication operations and cannot be attacked by matrix inversion

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

FY Rao. On the security of a variant of ElGamal encryption scheme. IEEE Trans. Dependable Secur. Comput. 2015; 14, 1-4.

CR Bharathi. Improved ElGamal encryption for elliptic curve cryptography. Int. J. Pure Appl. Math. 2018; 118, 341-53.

M Joye. Secure ElGamal-type cryptosystems without message encoding. In: P Ryan, D Naccache and JJ Quisquater (Eds.). The new codebreakers. Lecture notes in computure science. Springer, Berlin, Heidenberg, Germany, 2016, p. 470-8.

Y Lu, L Peng and S Sarkar. Cryptanalysis of an RSA variant with moduli N = pr ql. J. Math. Cryptol. 2017; 11, 117-30.

MR Valluri. Zero-knowledge authentication schemes using quasi-polynomials over non-commutative groups. Open J. Inf. Secur. Appl. 2014; 1, 43-9.

B Tsaban. Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography. J. Cryptol. 2015; 28, 601-22.

A Mahalanobis. A simple generalization of the ElGamal cryptosystem to non-abelian groups II. Commun. Algebra 2012; 40, 3583-96.

GSGN Anjaneyulu and A Sanyasirao. Distributed group key management protocol over non-commutative division semirings. Indian J. Sci. Technol. 2014; 7, 871-6.

ZY Karatas, E Luy and B Gonen. A public key cryptosystem based on matrices. Int. J. Comput. Appl. 2019; 182, 47-50.

M Zeriouh, A Chillali and A Boua. Cryptography based on the matrices. Bol. Soc. Paran. Mat. 2019; 37, 75-83.

M Andrecut. A matrix public key cryptosystem, Available at: https://arxiv.org/abs/1506.00277, accessed May 2020.

AVN Krishna, AH Narayana and KM Vani. A novel approach with matrix based public key cryptosystems. J. Discret. Math. Sci. Cryptogr. 2017; 20, 407-12.

J Liu, H Zhang and J Jia. Cryptanalysis of schemes based on polynomial symmetrical decomposition. Chinese J. Electron. 2017; 26, 1139-46.

J Liu, H Zhang, J Jia, H Wang, S Mao and W Wu. Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem. Sci. China Inf. Sci. 2016; 59, 052109.

Maxrizal. Hill cipher cryptosystem over complex numbers. Indones. J. Math. Educ. 2019; 2, 9-13.

Maxrizal and BDA Prayanti. Application of rectangular matrices: Affine cipher using asymmetric keys. Cauchy 2019; 5, 181-5.

KA Reddy, B Vishnuvardhan, Madhuviswanatham and AVN Krishna. A modified hill cipher based on circulant matrices. Procedia Technol. 2012; 4, 114-8.

H Anton and C Rorres. Elementary linear algebra: Applications version. 11th eds. John Wiley & Sons, Hoboken, NJ, 2013.

Downloads

Published

2022-01-20

How to Cite

Maxrizal, M. (2022). Public Key Cryptosystem Based on Singular Matrix. Trends in Sciences, 19(3), 2147. https://doi.org/10.48048/tis.2022.2147