
Security analysis of KAP based on enhanced MPF
Author(s) -
Sakalauskas Eligijus,
Mihalkovich Aleksejus,
Uselis Arnas
Publication year - 2020
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2019.0333
Subject(s) - nondeterministic algorithm , computer science , inversion (geology) , mathematics , function (biology) , security parameter , security analysis , theoretical computer science , algorithm , cryptography , computer security , paleontology , structural basin , evolutionary biology , biology
In the previous study, authors proved that inversion of enhanced matrix power function (MPF), introduced as conjectured one‐way function, is a nondeterministic polynomial time (NP)‐complete problem. Furthermore, a key agreement protocol (KAP), the security of which relies on the inversion of this function, was previously proposed. The problem is that the application of MPF can yield weak keys under the linearisation attack. In this study, the authors perform a security analysis of the proposed KAP and give recommendations to avoid weak keys. Their method relies on the conjecture that enhanced MPF is an almost one‐to‐one function when entries of power matrices are bound to a certain range. Their result is a security parameter definition and its secure value determination using numerical simulation. On the basis of the obtained result, they estimate memory requirements for storing public parameter and keys.