A Closer Look at the Tropical Cryptography

Steve Isaac, Delaram Kahrobaei

We examine two public key exchange protocols proposed recently by Grigoriev and Shpilrain (arXiv:1811.06386), which use tropical algebra. We introduce a fast attack on the first protocol, and we show that the second protocol cannot be implemented as described.

Knowledge Graph

arrow_drop_up

Comments

Sign up or login to leave a comment