Abstract
We examine two public key exchange protocols proposed recently which
use tropical algebra. We introduce a fast attack on the first protocol, and
we show that the second protocol cannot be implemented as described.
use tropical algebra. We introduce a fast attack on the first protocol, and
we show that the second protocol cannot be implemented as described.
Original language | English |
---|---|
Number of pages | 7 |
Journal | International Journal of Computer Mathematics: Computer Systems Theory |
Publication status | Accepted/In press - 2020 |