The tropical version of El Gamal Encryption

Any Muanalifah*  -  Universitas Islam Negeri Walisongo Semarang, Indonesia
Ayus Riana Isnawati  -  Universitas Islam Negeri Walisongo Semarang, Indonesia
Rosalio Artes Jr.  -  Mindanao State University, Philippines
Nurwan Nurwan  -  Universitas Negeri Gorontalo, Indonesia

(*) Corresponding Author

In this paper, we consider the new version of tropical cryptography protocol, i.e the tropical version of El Gamal encryption.  We follow the ideas and modify the clasical El Gamal encryption using tropical matrices and matrix power in tropical algebra. Then we also provide a toy example for the reader’s understanding. 

Keywords: tropical algebra; tropical cryptography; El Gamal Encryption

  1. Ahmed, K., Pal, S., & Mohan, R. (2023a). A review of the tropical approach in cryptography. Cryptologia, 47(1), 63–87. https://doi.org/10.1080/01611194.2021.1994486
  2. Ahmed, K., Pal, S., & Mohan, R. (2023b). Key exchange protocol based upon a modified tropical structure. Communications in Algebra, 51(1), 214–223. https://doi.org/10.1080/00927872.2022.2095566
  3. Akian, M., Bapat, R., & Gaubert, S. (2013). Max-Plus Algebra, In L. Hogben, editor, Handbook of linear algebra, chapter 25. Chapman and Hall/CRC, Boca Raton, FL, 2 Edition.
  4. Baccelli, F., Cohen, G., Olsder, G. J., & Quadrat, J.-P. (1992). Synchronization and Linearity: An Algebra for Discrete Event Systems. Wiley.
  5. Burkard, R. E., & Butkovic, P. (2003). Max algebra and the linear assignment problem. Mathematical Programming, 98(1–3), 415–429. https://doi.org/10.1007/s10107-003-0411-9
  6. Butkovič, P. (2010). Max-linear Systems: Theory and Algorithms. Springer London. https://doi.org/10.1007/978-1-84996-299-5
  7. Cohen, G., Gaubert, S., & Quadrat, J.-P. (1999). Max-plus algebra and system theory: Where we are and where to go now. Annual Reviews in Control, 23, 207–219. https://doi.org/10.1016/S1367-5788(99)90091-3
  8. Bart, D. S., & Boom, T. van den. (2008). Max-plus algebra and max-plus linear discrete event systems: An introduction “Proceedings of the 9th International Workshop on Discrete Event Systems (WODES’08).”
  9. Durcheva, M. I., Trendafilov, I. D., & Rachev, M. (2014). Public key cryptosystem based on endomorphism semirings of a finite chain. 330–335. https://doi.org/10.1063/1.4902494
  10. Elgamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469–472. https://doi.org/10.1109/TIT.1985.1057074
  11. Elsner, L., & Driessche, P. van den. (1999). On the power method in max algebra. Linear Algebra and Its Applications, 302–303, 17–32. https://doi.org/10.1016/S0024-3795(98)10171-4
  12. Elsner, L., & Driessche, P. van den. (2001). Modifying the power method in max algebra. Linear Algebra and Its Applications, 332–334, 3–13. https://doi.org/10.1016/S0024-3795(00)00062-8
  13. Gaubert, S., & Plus, M. (1997). Methods and applications of (max,+) linear algebra (pp. 261–282). https://doi.org/10.1007/BFb0023465
  14. Grigoriev, D., & Ponomarenko, I. (2005). Constructions in public-key cryptography over matrix groups.
  15. Grigoriev, D., & Shpilrain, V. (2014). Tropical Cryptography. Communications in Algebra, 42(6), 2624–2632. https://doi.org/10.1080/00927872.2013.766827
  16. Grigoriev, D., & Shpilrain, V. (2018). Tropical cryptography II: extensions by homomorphisms. https://doi.org/https://doi.org/10.48550
  17. Grigoriev, D., & Shpilrain, V. (2019). Tropical cryptography II: Extensions by homomorphisms. Communications in Algebra, 47(10), 4224–4229. https://doi.org/10.1080/00927872.2019.1581213
  18. Huang, H., Li, C., & Deng, L. (2022). Public-Key Cryptography Based on Tropical Circular Matrices. Applied Sciences, 12(15), 7401. https://doi.org/10.3390/app12157401
  19. Isaac, S., & Kahrobaei, D. (2021). A closer look at the tropical cryptography. International Journal of Computer Mathematics: Computer Systems Theory, 6(2), 137–142. https://doi.org/10.1080/23799927.2020.1862303
  20. Kotov, M., & Ushakov, A. (2018). Analysis of a key exchange protocol based on tropical matrix algebra. Journal of Mathematical Cryptology, 12(3), 137–141. https://doi.org/10.1515/jmc-2016-0064
  21. Muanalifah, A., & Sergeev, S. (2020). Modifying the tropical version of Stickel’s key exchange protocol. Applications of Mathematics, 65(6), 727–753. https://doi.org/10.21136/AM.2020.0325-19
  22. Muanalifah, A., & Sergeev, S. (2022). On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product. Communications in Algebra, 50(2), 861–879. https://doi.org/10.1080/00927872.2021.1975125
  23. Nishida, Y. (2023). Algorithm for the CSR expansion of max-plus matrices using the characteristic polynomial. https://doi.org/https://doi.org/10.48550/arXiv.2311.03844
  24. Rudy, D., & Monico, C. (2020). Remarks on a Tropical Key Exchange System. Journal of Mathematical Cryptology, 15(1), 280–283. https://doi.org/10.1515/jmc-2019-0061
  25. Sergeev, S., & Schneider, H. (2012). CSR expansions of matrix powers in max algebra. Transactions of the American Mathematical Society, 364(11), 5969–5994. https://doi.org/10.1090/S0002-9947-2012-05605-4

Open Access Copyright (c) 2023 Journal of Natural Sciences and Mathematics Research
Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Journal of Natural Sciences and Mathematics Research
Published by Faculty of Science and Technology
Universitas Islam Negeri Walisongo Semarang

Jl Prof. Dr. Hamka Kampus III Ngaliyan Semarang 50185
Website: https://journal.walisongo.ac.id/index.php/JNSMR
Email:jnsmr@walisongo.ac.id

ISSN: 2614-6487 (Print)
ISSN: 2460-4453 (Online)

View My Stats

Lisensi Creative Commons

This work is licensed under a Creative Commons Lisensi Creative Commons .

apps