<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Stefano Pironio, and Valerio Scarani Phys. Rev. Lett.</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Generation of high order primitive matrix elements for post-quantum key exchange protocol</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Richard Megrelishvili</string-name>
          <email>richard.megrelishvili@tsu.ge</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Melkisadeg</string-name>
          <email>mjinji@yahoo.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Avtandil Gagnidze</string-name>
          <email>gagnidzeavto@yahoo.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maksim Iavich</string-name>
          <email>m.iavich@scsa.ge</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giorgi Iashvili</string-name>
          <email>g.iashvili@scsa.ge</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Faculty of management., Bank of Georgia, University</institution>
          ,
          <addr-line>Tbilisi</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Jinjikhadze, Math dept. Akaki, Tsereteli State, University</institution>
          ,
          <addr-line>Kutaisi</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Math dept. Tbilisi State, University</institution>
          ,
          <addr-line>Tbilisi</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>School of technology., Caucasus University</institution>
          ,
          <addr-line>Tbilisi</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <day>4</day>
        <month>6</month>
        <year>2007</year>
      </pub-date>
      <volume>98</volume>
      <issue>230501</issue>
      <fpage>48</fpage>
      <lpage>51</lpage>
      <abstract>
        <p>- Active work is performed to create quantum computers. Quantum computers can break existing public key cryptography. So they can break Diffie-Hellman key exchange protocol. Matrix algorithms of key exchange can be considered as the alternative to Diffie-Hellman key exchange protocol. The improved method of key-exchange protocol is offered in the article. The method deals with the original matrix one-way function and the generalized method of processing the corresponding high order matrix multiplicative finite commutative group.</p>
      </abstract>
      <kwd-group>
        <kwd>Matrix One-way Function</kwd>
        <kwd>Abelian Finite Field</kwd>
        <kwd>Asymmetric Cryptography</kwd>
        <kwd>High order finite matrix Field</kwd>
        <kwd>Primitive Matrix Element</kwd>
        <kwd>quantum computers</kwd>
        <kwd>post-quantum cryptography</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>Scientists and experts are actively working on the creation of
quantum computers. GOOGLE Corporation, NASA the
association USRA (Universities Space Research Association
and D-Wave teamed-up to develop quantum processors.
Quantum computers can break existing public-key crypto
systems. Quantum computer solves the discrete logarithm
problem both for finite fields and elliptic curves. Being able to
calculate efficiently discrete logarithms, it can break
Diffie</p>
    </sec>
    <sec id="sec-2">
      <title>Hellman key exchange protocol.</title>
      <p>Quantum computer also solves the factorization problem, so it
can easily break RSA cryptosystem.</p>
      <p>© 2019 for this paper by its authors. Use permitted under Creative
Commons License Attribution 4.0 International (CC BY 4.0)</p>
    </sec>
    <sec id="sec-3">
      <title>II. ONE-WAY MATRIX FUNCTION</title>
      <p>One of the modifications of Diffie-Hellman's well-known
method of cryptographic key exchange is the matrix algorithms
of the exchange, the basis for which is the high order cyclic
multiplicative matrix groups in the GF (2) field.</p>
      <p>Suppose that the P matrix is a primitive element of a cyclic
matrix group. While (P) is a multiplicative group formed by this
matrix, with the power 2 − 1, where n is the size of the square
matrix.</p>
      <p>The matrix algorithm for general key development is the
following:</p>
    </sec>
    <sec id="sec-4">
      <title>The sender sends to the receiving party via the open</title>
      <p>channel  1 =   1 vector, where  1 ∈ 〈 〉 is the secret matrix,
selected by the sender, and  ∈   is commonly known (  – is
vector space on</p>
      <p>(2)field);</p>
      <p>The receiving party chooses  2 ∈ 〈 〉 to send a secret
matrix and sends to the sender  2 =   2 vector;
non-secret vectors from the above mentioned algorithm and
 1 = ( ⋮
is the secret matrix. Then, according to the algorithm:
  1 = (  1 12 +  2 22 + ⋯ +     2
The number of variables in the system of linear equations is the
square of the number of equations. Generally, solutions in such
cases are not uniquely defined, and the system has infinitely
many solutions. However, because we deal with a special types
of matrices, the solution is defined uniquely. In addition, it is
obvious that the solution of the system is very time consuming
and is practically impossible in real time if the size of the matrix
is large enough.</p>
      <p>All this makes it necessary to generate high order Abelian
multiplication matrix group, whose primitive element will be a
high order quadratic matrix.
Let's consider (1 +  ) , where  = 0, 1, 2, ⋯, and α represents
the root of primitive polynomial in the 
(2 )field with the
module  ( ).</p>
      <p>(1 +  )0 = 1
(1 +  )1 = 1 + 
(1 +  )2 = 1 +  2
(1 +  )3 = 1 +  +  2 +  3
(1 +  )4 = 1 +  4
(1 +  )5 = 1 +  +  4 +  5
1
11
101
1111
10001
110011</p>
      <p>The polynomial coefficients generated by the above structure,
are known as the Serpinsky triangle. Serpinsky's structure
contains a number of sub-structures, that can be used as a
generator (generating matrix) for multiplication groups, i.e.
primitive elements. For example,
Therefore we derived the insertion-enlargement method of
second order enlargement of the basic structure of P3 [5].
Let’s keep the structure of the matrix
 3 and enlarge it by
elements of the set (4) as following [5]:
 3</p>
      <p>3


 3
0
 3</p>
      <p>3
0
 32( ,  )= ( 3
0 ), where i,j=0..6.</p>
      <p>
        (
        <xref ref-type="bibr" rid="ref3">5</xref>
        )

 3 matrix is called a basic structure and let’s call  3 and  3
matrices the first and the second enlarged matrice and  32( ,  )
matrix let’s call the second order ( ,  ) enlargement of  3.
(2)
(3)
(4)
The set  3 ,  = 1,2, … , 23 − 1 is called the primary group for
It is easy to check that  5 is a primitive element. It means
 ( 32( ,  + 1))group.
      </p>
    </sec>
    <sec id="sec-5">
      <title>We have proved the following statement:</title>
      <p>that  5 ,  = 1,2, … , 25 − 1 is a finite Abelian multiplicative
group.</p>
      <p>Any second order ( ,  + 1) enlargement of  3  32( ,  + 1),
Consider basic structure  3 and enlarge it by  50 and  51
 = 0. .5, is a primitive element and forms a finite Abelian
matrices.</p>
      <p>
        ([ 32(
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        )]22∙31+231+1) ,  = 1,2, …
diagonal matrix are also diagonal
and because of the set
 ( 32(
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ))are a finite group, when  = 2
31 − 1, so we see:
      </p>
    </sec>
    <sec id="sec-6">
      <title>It is easy to check that</title>
      <p>
        matrices are primitive elemenents. Therefore the set
 ( 3×51( 50,  51))is a finite Abelian multiplicative group.
multiplicative group  ( 32( ,  + 1))with power 232– 1.
For example, the matrix  32(
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        )is primitive, and the matrix
[ 32(
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        )]22∙31+231+1 is diagonal matrix:
[ 32(
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        )]22∙31+231+1=( 0
0 ) =
( 33)

)
(7)
As we perform the matrix operations correspondig to the
module of the primary group, the matrix (7) is the identity
matrix. That means, that the set  ( 32(
        <xref ref-type="bibr" rid="ref1">0,1</xref>
        ))is a finite group.
Note that we can consider any element of (4) as the basic
structure. There exist the enlargement of this element using  30
and  31 matrices, that is primitive.
      </p>
      <p>For example, following enlargements are primitive:
 31  31
 30
0
0
0
0  31) , ( 31  31  31) , ( 0
 31</p>
      <p>There exist such enlargements of  3 matrix by  50 and  51
matrices, that are primitive elements. For example:
is a diagonal matrix. With the analogy to (7) we see that
([ 3×51( 50,  51)]22∙51+251+1) ,  = 1,2, …
diagonal, and when  = 2
51 − 1, we see</p>
      <p>52 
(
0
0
 52</p>
      <p>0
0
0
0
 52 

)
the
identity
matrix.</p>
      <p>That
means,
that
the
set
 ( 3×51( 50,  51))is a finite Abelian multiplicative group with
power of 23×51 − 1.</p>
      <p>Consider now
enlargements of order k=2
 5 ,  =
1,2, … , 25 − 1 of the primitive element  5 using elements
 5 ( 50,  51),  = 2. There exist such enlargements, that form a
primitive matrix. For example:
 5 ( 50,  51)=
,  = 2
the matrix ( 5 ( 50,  51)) , where</p>
      <p>Using the software developed by us, it could be seen that
 = 24∙5 −1
+ 23∙5 −1
+ 22∙5 −1</p>
      <p>24∙5 −1+23∙5 −1+22∙5 −1+25 −1+1
=
 54
All powers ( 5 ( 50,  51))</p>
      <p>, are diagonal matrices with
elements  5 ,  = 1,2, … , 25 − 1 from
primary
group
3 −1
diagonal. When  = 2</p>
      <p>− 1, we have the identity matrix:
(
 4 
5</p>
      <p />
    </sec>
    <sec id="sec-7">
      <title>CONCLUSIONS</title>
      <p>The results, described above, give us the prospect of generating
the high order multiplicative Abelian matrix groups and of the
creating
protocol,
resistant
quantum
computers attacks.</p>
    </sec>
    <sec id="sec-8">
      <title>ACKNOWLEDGMENT The Work Was Conducted as a Part of Research Grant of Joint Project of Shota Rustaveli National Science Foundation and Science &amp; Technology Center in Ukraine [№ STCU-2016-08]</title>
      <p>Springer, Cham
Rogaway P. (eds) Advances in Cryptology – CRYPTO 2011.
CRYPTO 2011. Lecture Notes in Computer Science, vol 6841.</p>
      <p>Springer, Berlin, Heidelberg</p>
      <p>Iashvili, Post-quantum</p>
      <p>Key Exchange Protocol Using</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]. Gagnidze
          <string-name>
            <given-names>A.G.</given-names>
            ,
            <surname>Iavich</surname>
          </string-name>
          <string-name>
            <given-names>M.P.</given-names>
            ,
            <surname>Iashvili</surname>
          </string-name>
          <string-name>
            <surname>G.U.</surname>
          </string-name>
          ,
          <source>Analysis of Post Quantum Cryptography use in Practice, Bulletin of the Georgian National Academy of Sciences</source>
          , vol.
          <volume>11</volume>
          , no.
          <issue>2</issue>
          ,
          <issue>2017</issue>
          , p.
          <fpage>29</fpage>
          -
          <lpage>36</lpage>
          [2]. Song
          <string-name>
            <surname>F.</surname>
          </string-name>
          (
          <year>2014</year>
          )
          <article-title>A Note on Quantum Security for Post-Quantum Cryptography</article-title>
          . In: Mosca M. (eds)
          <string-name>
            <surname>Post-Quantum Cryptography</surname>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <source>PQCrypto 2014. Lecture Notes in Computer Science</source>
          , vol
          <volume>8772</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [5]. 5.
          <string-name>
            <given-names>R.</given-names>
            <surname>Megrelishvili</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Jinjikhadze</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Iavich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gagnidze</surname>
          </string-name>
          , G.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>Dimensional</given-names>
            <surname>Matrix; CEUR Workshop</surname>
          </string-name>
          <article-title>Proceedings</article-title>
          (http://ceurws.org/Vol-
          <volume>2145</volume>
          /), Vol-
          <volume>2145</volume>
          <year>2019</year>
          [6]. Damaševičius,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Sidekerskienė</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            , &amp;
            <surname>Woźniak</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          (
          <year>2017</year>
          ).
          <article-title>IMF mode demixing in EMD for jitter analysis</article-title>
          .
          <source>Journal of Computational Science</source>
          ,
          <volume>22</volume>
          ,
          <fpage>240</fpage>
          -
          <lpage>252</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>