Research article Special Issues

New sequences from the generalized Pell pnumbers and mersenne numbers and their application in cryptography

  • This paper presents the generalized Pell pnumbers and provides some related results. A new sequence is defined using the characteristic polynomial of the Pell pnumbers and generalized Mersenne numbers. Two algorithms for Diffie-Hellman key exchange are given as an application of these sequences. They are illustrated via numerical examples and shown to be secure against attacks. Thus, these new sequences are practical for encryption and constructing private keys.

    Citation: Elahe Mehraban, T. Aaron Gulliver, Salah Mahmoud Boulaaras, Kamyar Hosseini, Evren Hincal. New sequences from the generalized Pell pnumbers and mersenne numbers and their application in cryptography[J]. AIMS Mathematics, 2024, 9(5): 13537-13552. doi: 10.3934/math.2024660

    Related Papers:

    [1] Faik Babadağ, Ali Atasoy . On hyper-dual vectors and angles with Pell, Pell-Lucas numbers. AIMS Mathematics, 2024, 9(11): 30655-30666. doi: 10.3934/math.20241480
    [2] Man Chen, Huaifeng Chen . On ideal matrices whose entries are the generalized $ k- $Horadam numbers. AIMS Mathematics, 2025, 10(2): 1981-1997. doi: 10.3934/math.2025093
    [3] Waleed Mohamed Abd-Elhameed, Amr Kamel Amin, Nasr Anwer Zeyada . Some new identities of a type of generalized numbers involving four parameters. AIMS Mathematics, 2022, 7(7): 12962-12980. doi: 10.3934/math.2022718
    [4] Aleksejus Mihalkovich . On the security of the STR key exchange protocol. AIMS Mathematics, 2025, 10(2): 1967-1980. doi: 10.3934/math.2025092
    [5] Waleed Mohamed Abd-Elhameed, Anna Napoli . New formulas of convolved Pell polynomials. AIMS Mathematics, 2024, 9(1): 565-593. doi: 10.3934/math.2024030
    [6] Changsheng Luo, Jiagui Luo . Complete solutions of the simultaneous Pell equations $ (a^2+1)y^2-x^2 = y^2-bz^2 = 1 $. AIMS Mathematics, 2021, 6(9): 9919-9938. doi: 10.3934/math.2021577
    [7] Cencen Dou, Jiagui Luo . Complete solutions of the simultaneous Pell's equations $ (a^2+2)x^2-y^2 = 2 $ and $ x^2-bz^2 = 1 $. AIMS Mathematics, 2023, 8(8): 19353-19373. doi: 10.3934/math.2023987
    [8] Adnan Karataş . Dual Leonardo numbers. AIMS Mathematics, 2023, 8(12): 30527-30536. doi: 10.3934/math.20231560
    [9] Faik Babadağ, Ali Atasoy . A new approach to Leonardo number sequences with the dual vector and dual angle representation. AIMS Mathematics, 2024, 9(6): 14062-14074. doi: 10.3934/math.2024684
    [10] Huaning Liu, Zhixiong Chen, Chenhuang Wu . Correlation measures of binary sequences derived from Euler quotients. AIMS Mathematics, 2022, 7(6): 11087-11101. doi: 10.3934/math.2022619
  • This paper presents the generalized Pell pnumbers and provides some related results. A new sequence is defined using the characteristic polynomial of the Pell pnumbers and generalized Mersenne numbers. Two algorithms for Diffie-Hellman key exchange are given as an application of these sequences. They are illustrated via numerical examples and shown to be secure against attacks. Thus, these new sequences are practical for encryption and constructing private keys.



    The Fibonacci sequence {Fn} is defined as

    Fn=Fn1+Fn2,n0,

    with initial conditions F0=0 and F1=1. This sequence and its generalizations (e.g. k-Fibonacci sequences and k-Pell sequences), have been investigated extensively and there are applications in many diverse fields [1,2,3].

    The Pell sequence {Pn} is defined as

    Pn=2Pn1+Pn2,n2,

    with initial conditions P0=0 and P1=1. This sequence and its generalizations have also been studied extensively [4,5,6,7]. The Pell pnumbers are defined as follows.

    Definition 1.1 ([8]). For an integer p, the Pell pnumbers, denoted by {P(n,p)}, are

    P(n+p+1)=2P(n+p)+P(n),n0,

    where P(0)=P(1)=P(2)==P(p)=0, P(p)=1 and P(p+1)=0.

    Example 1.1. (i) The Pell pnumbers for p=2 are given by

    P(n+3)=2P(n+2)+P(n),n0,

    so the sequence is {P(n,2)}0={0,1,0,0,1,2,4,9,20,}.

    (ii) The Pell pnumbers for p=3 are given by

    P(n+4)=2P(n+3)+P(n),n0,

    so, the sequence is {P(n,3)}0={0,0,1,0,0,0,1,2,4,8,17,36,76,160,}.

    The generalized order k-Pell sequences were defined in [9] as the semi-direct product of finite cyclic groups. In [10], the quaternion-Pell sequence was introduced and extended to finite cyclic groups. The generalized order k-Pell sequences for special groups of nilpotency class 2 were given in [11]. Two new identities involving generalized Fibonacci and generalized Lucas numbers were introduced in [12]. In [13], a Horadam-type of generalization was provided which involves the generalized Fibonacci, generalized Lucas, Fibonacci, Lucas, Pell, Pell-Lucas, Fermat, Fermat-Lucas, Jacobsthal, Jacobsthal-Lucas, balancing, and co-balancing numbers. Expressions connecting two generalized classes of Fibonacci and Lucas polynomials were given in [14]. A class of polynomials known as convolved Pell polynomials was investigated in [15].

    Another important sequence is the Mersenne numbers. The nth Mersenne number has the form Mn=2n1 where n is a nonnegative integer. A generalization of these numbers is as follows:

    Definition 1.2 ([16]). For k3 an integer, the generalized Mersenne numbers, denoted by {M(k,n)}0, are

    M(k,n)=kM(k,n1)(k1)M(k,n2),n0,

    with initial conditions M(k,0)=0 and M(k,1)=1.

    For k=3, we have

    M(3,n)=3M(3,n1)2M(3,n2),n0,

    which gives the sequence {M(3,n)}0={0,1,3,7,}. The Mersenne numbers and their generalizations and properties have been studied extensively [17,18,19,20,21]. The characteristic polynomials of the Pell pnumbers and generalized Mersenne numbers are xp+12xp1 and x2kx+k1, respectively.

    The Hadamard-type product of polynomials f and g is defined as follows:

    Definition 1.3 ([22]). The Hadamard-type product of polynomials f and g is fg=i=0(aibi)xi where

    aibi={aibi,ifaibi0,ai+bi,ifaibi=0,

    and f(x)=amxm++a1x+a0 and g(x)=bnxn+bn1xn1++b1x+b0.

    Diffie-Hellman key exchange is one of the earliest and most widely used public-key cryptographic primitives [24,25,26]. It allows two parties who have never met to exchange a secret key over an open channel. In [27], the Diffie-Hellman key exchange protocol was studied using matrices over noncommutative rings. A universal algebraic generalization of the Diffie-Hellman scheme was proposed in [28].

    Motivated by the above results and the practical importance of Diffie-Hellman key exchange, we first generalize the Pell numbers and study their combinatorial representations. Then the characteristic polynomials of the Pell pnumbers and generalized Mersenne numbers are used to obtain new sequences. As an application, these sequences are employed to obtain a new Diffie-Hellman key exchange. This is the first algorithm that uses sequences and matrices to obtain a key.

    The remainder of this paper is organized as follows: Section 2 presents the Pell (p,t)numbers and their combinatorial representation and matrices are given. In Section 3, the Hadamard-type product of Pell pnumber polynomials and generalized Mersenne numbers are considered. Section 4 provides a Diffie-Hellman key exchange using the Pell (p,t)numbers and the Hadamard-type Pell-Mersenne pnumbers. Finally, some concluding remarks are given in Section 5.

    In this section, we define the Pell (p,t)numbers and obtain new sequences. Then their structure is investigated. The Pell (p,t)numbers, p an integer, are defined as follows.

    Definition 2.1. For integers p and t, the Pell (p,t)numbers, denoted by {Pn(p,t)}, are

    Pn(p,t)=2Pn1(p,t)+Pnp1(p,t)++Pnpt1(p,t),np+t+1, (2.1)

    where P0(p,t)=P1(p,t)==Pp+t1(p,t)=0, Pp+t(p,t)=1.

    Example 2.1. (i) The Pell (p,t)numbers for p=2 and t=1 are given by

    Pn(2,1)=2Pn1(2,1)+Pn3(2,1)+Pn4(2,1),n4,

    so the sequence is {Pn(2,1)}0={0,0,0,1,2,4,9,21,48,109,248,565,}.

    (ii) The Pell (p,t)numbers for p=3 and t=1 are given by

    Pn(3,1)=2Pn1(3,1)+Pn4(3,1)+Pn5(3,1),n5,

    so the sequence is {Pn(3,1)}0={0,0,0,1,2,4,8,17,37,80,172,}.

    Lemma 2.1. Let u(x) be the generating function of the Pell (p,t)numbers. Then

    u(x)=xp+t12xxp+1xp+2xp+t+1 (2.2)

    Proof. We have

    u(x)=n=1Pn(p,t)xn=P1(p,t)x+P2(p,t)x2++Pp+t(p,t)xp+t+n=p+t+1Pn(p,t)xn=xp+t+n=p+t+1[2Pn1(p,t)+Pnp1(p,t)++Pnpt1(p,t)]xn=xp+t+n=p+t+12Pn1(p,t)xn+n=p+t+1Pnp1(p,t)xn++n=p+t+1Pnpt1(p,t)xn=xp+t+2xn=1Pn(p,t)xn+xp+1n=1Pn(p,t)xn++xp+t+1n=1Pn(p,t)xn=xp+t+2xu(x)+xp+1u(x)++xp+t+1u(x).

    Theorem 2.1. The Pell (p,t)numbers {Pn(p,t)} have the following exponential representation

    t(x)=xp+texpi=1(x)ii(2+xp+xp+1++xp+t)i,p2.

    Proof. Using (2.2), we have

    lnu(x)=lnxp+tln(12xxp+1xp+2xp+t+1).

    Since

    ln(12xxp+1xp+2xp+t+1)=[x(2+xp+xp+1++xp+t)12x2(2+xp+xp+1++xp+t)21nxn(2+xp+xp+1++xp+t)n],

    the result follows.

    Let t=1. Then the recurrence relation (2.1) gives

    [Pn(p,1)Pn1(p,1)Pnpt+1(p,1)Pnpt(p,1)]=[20011100110010000010][Pn1(p,1)Pn2(p,1)Pnpt(p,1)Pnpt1(p,1)].

    Lemma 2.2. For p=2, t=1, and n4, we have

    (M2(1))n=[Pn+3(2,1)Pn+1(2,1)+Pn(2,1)Pn+2(2,1)+Pn+1(2,1)Pn+2(2,1)Pn+2(2,1)Pn(2,1)+Pn1(2,1)Pn+1(2,1)+Pn(2,1)Pn+1(2,1)Pn+1(2,1)Pn1(2,1)+Pn2(2,1)Pn(2,1)+Pn1(2,1)Pn(2,1)Pn(2,1)Pn2(2,1)+Pn3(2,1)Pn1(2,1)+Pn2(2,1)Pn1(2,1)]4×4

    where

    M2(1)=[2011100001000010].

    Proof. By induction on n. For p=2, t=1, and n=4, we have

    (M2(1))4=[216139936441322011]=[P7(2,1)P5(2,1)+P4(2,1)P5(2,1)+P6(2,1)P6(2,1)P6(2,1)P4(2,1)+P3(2,1)P4(2,1)+P5(2,1)P5(2,1)P5(2,1)P3(2,1)+P2(2,1)P3(2,1)+P4(2,1)P4(2,1)P4(2,1)P2(2,1)+P1(2,1)P2(2,1)+P3(2,1)P3(2,1)].

    Now, assume that the statement holds for n=s. Then for n=s+1

    (M2(1))s+1=[2011100001000010]×[Ps+3(2,1)Ps+1(2,1)+Ps(2,1)Ps+2(2,1)+Ps+1(2,1)Ps+2(2,1)Ps+2(2,1)Ps(2,1)+Ps1(2,1)Ps+1(2,1)+Ps(2,1)Ps+1(2,1)Ps+1(2,1)Ps1(2,1)+Ps2(2,1)Ps(2,1)+Ps1(2,1)Ps(2,1)Ps(2,1)Ps2(2,1)+Ps3(2,1)Ps1(2,1)+Ps2(2,1)Ps1(2,1)]=[Ps+4(2,1)Ps+2(2,1)+Ps+1(2,1)Ps+3(2,1)+Ps+2(2,1)Ps+3(2,1)Ps+3(2,1)Ps+1(2,1)+Ps(2,1)Ps+2(2,1)+Ps+1(2,1)Ps+2(2,1)Ps+2(2,1)Ps(2,1)+Ps1(2,1)Ps+1(2,1)+Ps(2,1)Ps+1(2,1)Ps+1(2,1)Ps1(2,1)+Ps2(2,1)Ps(2,1)+Ps1(2,1)Ps(2,1)],

    which completes the proof.

    Let Mp(1)=[mi,j](p+2)×(p+2) be the companion matrix for the Pell (p,1)numbers. It can be readily established by mathematical induction on n that for p3 and np+2

    (Mp(1))n=[Pn+p+1(p,1)Pn(p,1)+Pn+1(p,1)Pn+p(p,1)+Pn+p1(p,1)Pn+p(p,1)Pn+p(p,1)Pn1(p,1)+Pn(p,1)Pn+p1(p,1)+Pn+p2(p,1)Pn+p1(p,1)Pn+1(p,1)Pnp+1(p,1)+Pnp(p,1)Pn(p,1)+Pn1(p,1)Pn(p,1)Pn(p,1)Pnp(p,1)+Pnp1(p,1)Pn1(p,1)+Pn2(p,1)Pn1(p,1)].

    Theorem 2.2. For uN, p2 and np+2, we have

    (i) (Mp(1))n(Mp(1))u=(Mp(1))n+u.

    (ii) (Mp(1))n(Mp(1))u=(Mp(1))u(Mp(1))n.

    Proof. By induction on u. For u=1 we have

    (Mp(1))nMp(1)=[Pn+p+1(p,1)Pn(p,1)+Pn+1(p,1)Pn+p(p,1)+Pn+p1(p,1)Pn+p(p,1)Pn+p+(p,1)Pn1(p,1)+Pn(p,1)Pn+p1(p,1)+Pn+p2(p,1)Pn+p1(p,1)Pn+1(p,1)Pnp+1(p,1)+Pnp(p,1)Pn(p,1)+Pn1(p,1)Pn(p,1)Pn(p,1)Pnp(p,1)+Pnp1(p,1)Pn1(p,1)+Pn2(p,1)Pn1(p,1)]×[200011100000000100000010]=[Pn+p+2(p,1)Pn+1(p,1)+Pn+2(p,1)Pn+p+1(p,1)+Pn+p(p,1)Pn+p+1(p,1)Pn+p+1(p,1)Pn(p,1)+Pn+1(p,1)Pn+p(p,1)+Pn+p1(p,1)Pn+p(p,1)Pn+2(p,1)Pnp+2(p,1)+Pnp+1(p,1)Pn+1(p,1)+Pn(p,1)Pn+1(p,1)Pn+1(p,1)Pnp+1(p,1)+Pnp(p,1)Pn(p,1)+Pn1(p,1)Pn(p,1)]=(Mp(1))n+1.

    Now suppose it is true for u=s. Then for u=s+1

    (Mp(1))nMp(1)s+1=Mp(1)n+sMp(1)=[Pn+s+p+1(p,1)Pn+s(p,1)+Pn+s+1(p,1)Pn+s+p(p,1)+Pn+s+p1(p,1)Pn+s+p(p,1)Pn+s+p+(p,1)Pn+s1(p,1)+Pn+s(p,1)Pn+s+p1(p,1)+Pn+s+p2(p,1)Pn+s+p1(p,1)Pn+s+1(p,1)Pn+sp+1(p,1)+Pn+sp(p,1)Pn+s(p,1)+Pn+s1(p,1)Pn+s(p,1)Pn+s(p,1)Pn+sp(p,1)+Pn+sp1(p,1)Pn+s1(p,1)+Pn+s2(p,1)Pn+s1(p,1)]×[200011100000000100000010]=Mp(1)n+s+1,

    which completes the proof of (ⅰ). For (ⅱ), using (ⅰ) we have

    (Mp(1))n(Mp(1))u=(Mp(1))n+u=(Mp(1))u+n=(Mp(1))u(Mp(1))n.

    For n<0, the Pell (p,t)numbers are defined as

    Pn(p,t)=Pn+p+t+1(p,t)2Pn+p+t(p,t)+Pn+t(p,t)++Pn(p,t),n0.

    For n<0, the companion matrix of the Pell (p,1)numbers are defined as follows. For n=1 we have

    (Mp(1))1=[010000001000000001120011]

    and by induction on n, we obtain

    (Mp(1))n=[Pn+p+1(p,1)Pn(p,1)+Pn+1(p,1)Pn+p(p,1)+Pn+p1(p,1)Pn+p(p,1)Pn+p(p,1)Pn1(p,1)+Pn(p,1)Pn+p1(p,1)+Pn+p2(p,1)Pn+p1(p,1)Pn+1(p,1)Pnp+1(p,1)+Pnp(p,1)Pn(p,1)+Pn1(p,1)Pn(p,1)Pn(p,1)Pnp(p,1)+Pnp1(p,1)Pn1(p,1)+Pn2(p,1)Pn1(p,1)].

    Theorem 2.3. For uN, p2, and np+2, we have

    (i) (Mp(1))n(Mp(1))u=(Mp(1))(n+u).

    (ii) (Mp(1))n(Mp(1))u=(Mp(1))u(Mp(1))n.

    Proof. The proof is similar to that of Theorem 2.2 and so is omitted.

    In this section, new sequences are obtained using the Hadamard-type product of the Pell pnumbers and Mersenne numbers. Then, some results on their structure are obtained. First, we give the new Hadamard-type Pell-Mersenne psequences.

    Definition 3.1. For integers k3 and p3, the Hadamard-type Pell-Mersenne psequences, denoted by {MPn(k,p)}0, are

    MPn+p+1(k,p)=2MPn+p(k,p)MPn+2(k,p)+kMPn+1(k,p)+(k1)MPn(k,p),n0, (3.1)

    with initial conditions MP0(k,p)=MP1(k,p)==MPp1(k,p)=0 and MPp(k,p)=1.

    For example, the Hadamard-type Pell-Mersenne psequence for p=3 and k=3 is given by

    MPn+4(3,3)=2MPn+3(3,3)MPn+2(3,3)+3MPn+1(3,3)+2MPn(3,3),n0,

    so {MPn(3,3)}0={0,0,0,1,2,3,7,19,44,96,}, and for p=4 and k=3 is given by

    MPn+5(4,3)=2MPn+4(4,3)MPn+2(4,3)+3MPn+1(4,3)+2MPn(4,3),n0,

    so {MPn(4,3)}0={0,0,0,0,1,2,3,8,24,58,133,}.

    From the recurrence relation (3.1), we have

    [MPn+p+1(k,p)MPn+p(k,p)MPn+2(k,p)MPn+1(k,p)]=[2001kk1100000010000000100000010][MPn+p(k,p)MPn+p1(k,p)MPn+1(k,p)MPn(k,p)].

    The Hadamard-type Pell-Mersenne pnumbers have the following companion matrix

    Np(k)=[20001kk1100000001000000000010](p+1)×(p+1),

    and is called the Hadamard-type Pell-Mersenne pmatrix.

    Theorem 3.1. For p=3,k=3, and n4, we have

    (N3(3))n=[MPn+3(3,3)MPn+2(3,3)+(3MPn+1(3,3)+2MPn(3,3))MPn+2(3,3)MPn+1(3,3)+(3MPn(3,3)+2MPn1(3,3))MPn+1(3,3)MPn(3,3)+(3MPn1(3,3)+2MPn2(3,3))MPn(3,3)MPn1(3,3)+(3MPn2(3,3)+2MPn3(3,3))3MPn+2(3,3)+2MPn+1(3,3)3MPn+2(3,3)3MPn+1(3,3)+2MPn(3,3)3MPn+1(3,3)3MPn(3,3)+2MPn1(3,3)3MPn(3,3)3MPn1(3,3)+2MPn2(3,3)3MPn1(3,3)]:=Un(3)

    where

    N3(3)=[2132100001000010]4×4.

    Proof. By induction on n. For n=4 we have

    (N3(3))4=[1132100001000010]44×4=[19627147513631842132]=[MP7(3,3)MP6(3,3)+(3MP5(3,3)+2MP4(3,3))3MP6(3,3)+2MP5(3,3)3MP6(3,3)MP6(3,3)MP5(3,3)+(3MP4(3,3)+2MP3(3,3))3MP5(3,3)+2MP4(3,3)3MP5(3,3)MP5(3,3)MP4(3,3)+(3MP3(3,3)+2MP2(3,3))3MP4(3,3)+2MP3(3,3)3MP4(3,3)MP4(3,3)MP3(3,3)+(3MP2(3,3)+2MP1(3,3))3MP3(3,3)+2MP2(3,3)3MP3(3,3)],

    so the statement is true. Now, assume that the statement holds for n=t. Then, for n=t+1 we have

    (N3(3))t+1=[2132100001000010]×[MPt+3(3,3)MPt+2(3,3)+(3MPt+1(3,3)+2MPt(3,3))MPt+2(3,3)MPt+1(3,3)+(3MPt(3,3)+2MPt1(3,3))MPt+1(3,3)MPt(3,3)+(3MPt1(3,3)+2MPt2(3,3))MPt(3,3)MPt1(3,3)+(3MPt2(3,3)+2MPt3(3,3))3MPt+2(3,3)+2MPt+1(3,3)3MPt+2(3,3)3MPt+1(3,3)+2MPt(3,3)3MPt+1(3,3)3MPt(3,3)+2MPt1(3,3)3MPt(3,3)3MPt1(3,3)+2MPt2(3,3)3MPt1(3,3)]:=Ut+1(3),

    which completes the proof.

    Corollary 3.1. For p=3,k4, and n4, we have

    (N3(k))n=[MPn+3(k,3)MPn+2(k,3)+(kMPn+1(k,3)+(k1)MPn(k,3))MPn+2(k,3)MPn+1(k,3)+(kMPn(k,3)+(k1)MPn1(k,3))MPn+1(k,3)MPn(k,3)+(kMPn1(k,3)+(k1)MPn2(k,3))MPn(k,3)MPn1(k,3)+(kMPn2(k,3)+(k1)MPn3(k,3))kMPn+2(k,3)+(k1)MPn+1(k,3)kMPn+2(k,3)kMPn+1(k,3)+(k1)MPn(k,3)kMPn+1(k,3)kMPn(k,3)+(k1)MPn1(k,3)kMPn(k,3)kMPn1(k,3)+(k1)MPn2(k,3)kMPn1(k,3)],

    where

    N3(k)=[21kk1100001000010]4×4.

    Using induction on p4 and np+1 gives

    (N3(3))n=[MPn+p(k,p)kMPn+p1(k,p)+(k1)MPn+p2(k,p)(k1)MPn+p1(k,p)MPn+p1(k,p)kMPn+p2(k,p)+(k1)MPn+p3(k,p)(k1)MPn+p2(k,p)N3MPn+1(k,p)kMPn(k,p)+(k1)MPn1(k,p)(k1)MPn(k,p)MPn(k,p)kMPn1(k,p)+(k1)MPn2(k,p)(k1)MPn1(k,p)]
    N3=[MPn+2(k,p)+(kMPn+1(k,p)+(k1)MPn(k,p))MPn+1(k,p)+(kMPn(k,p)+(k1)MPn1(k,p))MPn(p3)(k,p)+(kMPn(p2)(k,p)+(k1)MPn(p1)(k,p))MPn(p2)(k,p)+(kMPn(p1)(k,p)+(k1)MPnp(k,p))MPn+p1(k,p)+(kMPn+p2(k,p)+(k1)MPn+p3(k,p))MPn+p2(k,p)+(kMPn+p3(k,p)+(k1)MPn+p4(k,p))MPn(k,p)+(kMPn1(k,p)+(k1)MPn2(k,p))MPn1(k,p)+(kMPn2(k,p)+(k1)MPn3(k,p))].

    Lemma 3.1. Let y(x) be the Hadamard-type Pell-Mersenne pnumbers. Then

    y(x)=xp12x+xp1kxp(k1)xp+1. (3.2)

    Proof. We have

    y(x)=n=1MPn(k,p)xn=MP1(k,p)x1+MP2(k,p)(k,p)x2++MPp1(k,p)xp1+MPp(k,p)xp+n=p+1MPn(k,p)xn=xp+n=p+1[2MPn+p(k,p)MPn+2(k,p)+kMPn+1(k,p)+(k1)MPn(k,p)]xn=xp+n=p+12MPn+p(k,p)xnn=p+1MPn+2(k,p)xn+kn=p+1MPn+1(k,p)xn+(k1)n=p+1MPn(k,p)xn=xp+2xn=1MPn(k,p)xnx2n=1MPn(k,p)xn+kxpn=1MPn(k,p)xn+(k1)xp+1n=1MPn(k,p)xn=xp+2xy(x)xp1y(x)+kxpy(x)+(k1)xp+1y(x).

    Theorem 3.2. The Hadamard-type Pell-Mersenne pnumbers sequences {MPn(k,p)} have the following exponential representation

    y(x)=xpexpi=1(x)ii(2xp2+kxp1+(k1)xp)i,p5.

    Proof. Using (3.2), we have

    ln(y(x))=lnxpln(12x+xp1kxp(k1)xp+1).

    Since

    ln(12x+xp1kxp(k1)xp+1)=[x(2xp2+kxp1+(k1)xp)12x2(2xp2+kxp1+(k1)xp)21ixi(2xp2+kxp1+(k1)xp)i]=i=1(x)ii(2xp2+kxp1+(k1)xp)i,

    the result follows.

    In this section, we present a new Diffie-Hellman key exchange using the Pell (p,t)numbers and Hadamard-type Pell-Mersenne pnumbers matrices. Then, a security analysis is given. Two algorithms are given below.

    Algorithm 1. Alice and Bob want to establish a secret key. They select a Pell (p,t)numbers matrix and q a prime number over an insecure channel. Alice chooses a random number a4 and sends Mp(1)a (mod q) to Bob. Bob chooses a random number b4 and sends Mp(1)b (mod q) to Alice. Alice and Bob both compute Mp(1)ab (mod q) and use this as their private key. The algorithm steps are given below and illustrated in Figure 1.

    Figure 1.  Algorithm 1.

    Step 1. The prime number q and generator Mp(1) are public (assume all users have agreed on the general linear group over a finite field Fq and Mp(1) as the Pell (p,1)matrix).

    Step 2. Alice chooses a random number a4 and sends Mp(1)a (mod q) to Bob.

    Step 3. Bob chooses a random number b4 and sends Mp(1)b (mod q) to Alice.

    Step 4. Alice and Bob both compute Mp(1)ab (mod q) and use this as the private key for future communications.

    Example 4.1. Let (M2(1),13) be the public key. Alice chooses a=4 and using Lemma 2.2 computes M2(1)4 (mod 13)

    (M2(1))4=[216139936441322011][8609936441322011] (mod 13),

    and sends this to Bob. Bob chooses b=7 and obtains M2(1)7 (mod 13)

    (M2(1))7=[2486915710910930694848133021216139][1415544990488609] (mod 13),

    and sends this to Alice. From Theorem 2.2, we have M2(1)4M2(1)7=M2(1)7M2(1)4, so Alice and Bob both compute

    (M2(1))7(M2(1))4=[2486915710910930694848133021216139][8609936441322011]=[1415544990488609][216139936441322011]=[6666676006766162] (mod 13).

    This is used as the private key for future communications.

    Algorithm 2. This algorithm is the same as Algorithm 1 but in Step 1 Np(k) is used.

    Example 4.2. Let (N3(3),11) be the public key. Alice chooses a=5 and using Lemma 2.2 computes N3(3)5 (mod 11)

    (N3(3))5=[44871381962714751363184][0855865375263184] (mod 11),

    and sends this to Bob. Bob chooses b=6 and obtains N3(3)6 (mod 11)

    (N3(3))6=[9627170884487138196271475136][8550085586537526] (mod 11),

    and sends this to Alice. From Theorem 2.2, we have N3(3)5N3(3)6=N3(3)6N3(3)5, so Alice and Bob both compute

    (N3(3))5(N3(3))6=[0855865375263184][8550085586537526][9998412847516329] (mod 11).

    This is used as the private key for future communications.

    One way for an adversary to obtain the key is to generate all possible matrices. Since q can be a very large prime number, it is intractable to check all qm2 matrices where m is the matrix size. Because the matrices used to make the key are invertible, it is possible to check only the order of the general linear group GLm(Fq) which also can be made intractable by choosing q a very large prime number and m large.

    GLm(Fq), q a prime number, consists of all invertible matrices of order m×m over Fq [29]. This group has order

    GLm(Fq)∣=(qmqm1)(qmqm2)(qm1).

    Consider Mp(1). Since Mp(1) is a (p+2)×(p+2) matrix, we must check

    GLp+2(Fq)∣=(qp+2qp+1)(qp+2qp)(qp+2q)(qp+21), (4.1)

    matrices. For example, for M48(1) over F37, we have

    GL50(F37)∣=(37503749)(37503748)(375037)(37501)=3.1×103920,

    and for the key Np(k)

    GLp+1(Fq)∣=(qp+1qp)(qp+1qp1)(qp+1q)(qp+11). (4.2)

    Table 1 gives Np(k), q, and GLp(Fq) for 2p4 and 2q11. This shows that as p and q increase, the number of matrices grows significantly. Thus, it can be made intractable to break the protocol. From (4.1) and (4.2), it is clear that the key size increases with p, i.e. GLp(Fq)∣→. Therefore, if the key space is large it is not practical to break the system via a brute-force attack [30].

    Table 1.  Np(k), q, and GLp(Fq) for 2p4 and 2q11.
    Np(k) q GLp(Fq)
    N2(k) 2 GL3(F2)∣=(2322)(232)(231)=168
    3 GL3(F3)∣=(3332)(333)(331)=11232
    5 GL3(F5)∣=(5352)(535)(531)=1488000
    7 GL3(F7)∣=(7372)(737)(731)=28613088
    11 GL3(F11)∣=(113112)(11311)(1131)=2124276000
    N3(k) 2 GL4(F2)∣=(2423)(2422)(242)(231)=20160
    3 GL4(F3)∣=(3433)(3432)(343)(331)=24261120
    5 GL4(F5)∣=(5453)(5452)(545)(541)=116064000000
    7 GL4(F7)∣=(7473)(7472)(747)(741)=27811094169600
    11 GL4(F11)∣=(114113)(114112)(11411)(1141)=4.13×1016
    N4(k) 2 GL5(F2)∣=(2524)(2523)(2522)(252)(251)=9999360
    3 GL5(F3)∣=475566474240
    5 GL5(F5)∣=2.26×1017
    7 GL5(F7)∣=1.8×1025
    11 GL5(F11)∣=9.7×1024

     | Show Table
    DownLoad: CSV

    In this paper, two new sequences were defined using the Pell and Mersenne sequences. Their structures were examined and some results obtained using them. Then, they were used to develop a new Diffie-Hellman key exchange protocol that provides high security. The matrices MP(1) and NP(k) are constructed using these sequences so calculations are fast when a and b are very large, but it is intractable for an adversary to determine the key. This is the first algorithm that uses sequences and matrices to obtain a key. The sequences presented are suitable for constructing private keys. Note that other sequences such as Fibonacci and Pell sequences can be used with the proposed approach to construct keys. In general, any matrix sequence that has the commutative property for multiplication is suitable for use with this algorithm. As future work, the new sequences presented in this paper can be used in other private or public key encryption algorithms.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    Researchers would like to thank the Deanship of Scientific Research, Qassim University, for funding the publication of this paper.

    The authors declare that there are no conflicts of interest regarding the publication of this paper.



    [1] N. Jiang, W. Y. Wu, L. Wang, The quantum realization of Arnold and Fibonacci image scrambling, Quantum Inf. Process., 13 (2014), 1223–1236. https://doi.org/10.1007/s11128-013-0721-7 doi: 10.1007/s11128-013-0721-7
    [2] B. Prased, Coding theory on Lucas p numbers, Discrete Math. Algorithms Appl., 8 (2016), 1650074. https://doi.org/10.1142/S1793830916500749 doi: 10.1142/S1793830916500749
    [3] T. Zhang, S. Li, R. Ge, M. Yuan, Y. Ma, A novel 1D hybrid chaotic map-based image compression and encryption using compressed sensing and Fibonacci-Lucas transform, Math. Probl. Eng., 2016 (2016), 7683687. https://doi.org/10.1155/2016/7683687 doi: 10.1155/2016/7683687
    [4] S. Halici, S. Oz, On Gaussian Pell polynomials and their some properties, Palest. J. Math., 7 (2018), 251–256.
    [5] M. Hashemi, E. Mehraban, Fibonacci length and the generalized order k-Pell sequences of the 2-generator p-groups of nilpotency class 2, J. Algebra Appl., 22 (2023), 2350061. https://doi.org/10.1142/S0219498823500615 doi: 10.1142/S0219498823500615
    [6] J. Hiller, Y. Aküzüm, Ö. Deveci, The adjacency-Pell-Hurwitz numbers, Integers, 18 (2018), A83. https://doi.org/10.5281/zenodo.10682656 doi: 10.5281/zenodo.10682656
    [7] E. Kilic, The generalized order-k Fibonacci-Pell sequence by matrix methods, J. Comput. Appl. Math., 209 (2007), 133–145. https://doi.org/10.1016/j.cam.2006.10.071 doi: 10.1016/j.cam.2006.10.071
    [8] E. Kilic, The generalized Pell (p,i)-numbers and their Binet formulas, combinatorial representations, sums, Chaos Solit. Fractals, 40 (2009), 2047–2063. https://doi.org/10.1016/j.chaos.2007.09.081 doi: 10.1016/j.chaos.2007.09.081
    [9] Ö. Deveci, The k-nacci sequences and the generalized order k-Pell sequences in the semi-direct product of finite cyclic groups, Chiang Mai J. Sci., 40 (2013), 89–98.
    [10] Ö. Deveci, A. G. Shannon, The quaternion-Pell sequence, Commun. Algebra, 46 (2018), 5403–5409. https://doi.org/10.1080/00927872.2018.1468906 doi: 10.1080/00927872.2018.1468906
    [11] M. Hashemi, E. Mehraban, The generalized order k-Pell sequences in some special groups of nilpotency class 2, Commun. Algebra, 50 (2021), 1768–1784. https://doi.org/10.1080/00927872.2021.1988959 doi: 10.1080/00927872.2021.1988959
    [12] W. M. Abd-Elhameed, N. A. Zeyada, New identities involving generalized Fibonacci and generalized Lucas numbers, Indian J. Pure Appl. Math., 49 (2018), 527–537. https://doi.org/10.1007/s13226-018-0282-7 doi: 10.1007/s13226-018-0282-7
    [13] A. K. Amin, N. A. Zeyada, Some new identities of a type of generalized numbers involving four parameters, AIMS Math., 7 (2021), 12962–12980. https://doi.org/10.3934/math.2022718 doi: 10.3934/math.2022718
    [14] W. M. Abd-Elhameed, A. N. Philippou, N. A. Zeyada, Novel results for two generalized classes of Fibonacci and Lucas polynomials and their uses in the reduction of some radicals, Mathematics, 10 (2022), 2342. https://doi.org/10.3390/math10132342 doi: 10.3390/math10132342
    [15] W. M. Abd-Elhameed, A. Napoli, New formulas of convolved Pell polynomials, AIMS Math., 9 (2024), 565–593. https://doi.org/10.3934/math.2024030 doi: 10.3934/math.2024030
    [16] P. Ochalik, A. Wloch, On generalized Mersenne numbers, their interpretations and matrix generators, Ann. Univ. Mariae Curie-Skłodowska, Sect. A, 72 (2018), 69–76. https://doi.org/10.17951/a.2018.72.1.69-76 doi: 10.17951/a.2018.72.1.69-76
    [17] P. Catarino, H. Campos, P. Vasco, On the Mersenne sequence, Ann. Math. Inform., 46 (2016), 37–53.
    [18] M. Chelgham, A. Boussayoud, On the k-Mersenne-Lucas numbers, Notes Number Theory Discrete Math., 27 (2021), 7–13. https://doi.org/10.7546/nntdm.2021.27.1.7-13 doi: 10.7546/nntdm.2021.27.1.7-13
    [19] A. S. Sergeer, Generalized Mersenne matrices and Balonin's conjecture, Autom. Control Comput. Sci., 48 (2014), 214–220. https://doi.org/10.3103/S0146411614040063 doi: 10.3103/S0146411614040063
    [20] Y. Soykan, On generalized p-Mersenne numbers, Earthline J. Math. Sci., 8 (2022), 83–120. https://doi.org/10.34198/ejms.8122.83120 doi: 10.34198/ejms.8122.83120
    [21] Y. Zheng, S. Shon, Exact inverse matrices of Fermat and Mersenne circulant matrix, Abstr. Appl. Anal., 2015 (2015), 760823. https://doi.org/10.1155/2015/760823 doi: 10.1155/2015/760823
    [22] Y. Akuzum, Ö. Deveci, The Hadamard-type k-step Fibonacci sequences in groups, Commun. Algebra, 48 (2020), 2844–2856. https://doi.org/10.1080/00927872.2020.1723609 doi: 10.1080/00927872.2020.1723609
    [23] L. Chen, Y. Chen, The n-Diffie-Hellman problem and multiple-key encryption, Int. J. Inf. Secur., 11 (2012), 305–320. https://doi.org/10.1007/s10207-012-0171-8 doi: 10.1007/s10207-012-0171-8
    [24] H. Chien, Provably secure authenticated Diffie-Hellman key exchange for resource-limited smart card, J. Shanghai Jiaotong Univ. (Sci.), 19 (2014), 436–439. https://doi.org/10.1007/s12204-014-1521-7 doi: 10.1007/s12204-014-1521-7
    [25] D. Coppersmith, A. M. Odlzyko, R. Schroeppel, Discrete logarithms in GF(p), Algorithmica, 1 (1986), 1–15. https://doi.org/10.1137/0406010 doi: 10.1137/0406010
    [26] L. Harn, C. Lin, Efficient group Diffie-Hellman key agreement protocols, Comput. Electr. Eng., 40 (2014), 1972–1980. https://doi.org/10.1016/j.compeleceng.2013.12.018 doi: 10.1016/j.compeleceng.2013.12.018
    [27] M. Eftekhari, A Diffie-Hellman key exchange protocol using matrices over noncommutative rings, Groups Complex. Cryptol., 4 (2012), 167–176. https://doi.org/10.1515/gcc-2012-0001 doi: 10.1515/gcc-2012-0001
    [28] J. Partala, Algebraic generalization of Diffie-Hellman key exchange, J. Math. Cryptol., 12 (2018), 1–21. https://doi.org/10.1515/jmc-2017-0015 doi: 10.1515/jmc-2017-0015
    [29] P. A. Grillet, Abstract Algebra, 2 Eds., Berlin: Springer, 2007.
    [30] W. Stallings, Cryptography and Network Security: Principles and Practice, 7 Eds., Harlow: Pearson, 2017.
  • This article has been cited by:

    1. Ömür Deveci, Anthony G. Shannon, Özgür Erdağ, Güntaç Ceco, The complex-type k-Padovan sequences and their applications, 2024, 0938-1279, 10.1007/s00200-024-00672-4
    2. Özgür Erdağ, James F. Peters, Ömür Deveci, The Jacobsthal–Padovan–Fibonacci p-sequence and its application in the concise representation of vibrating systems with dual proximal groups, 2025, 81, 0920-8542, 10.1007/s11227-024-06608-6
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1151) PDF downloads(57) Cited by(2)

Figures and Tables

Figures(1)  /  Tables(1)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog