<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">info21205</article-id><article-id pub-id-type="doi">10.15388/Informatica.2010.284</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Raulynaitis</surname><given-names>Andrius</given-names></name><email xlink:href="mailto:andrius.raulynaitis@stud.ktu.lt">andrius.raulynaitis@stud.ktu.lt</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Sakalauskas</surname><given-names>Eligijus</given-names></name><email xlink:href="mailto:eligijus.sakalauskas@ktu.lt">eligijus.sakalauskas@ktu.lt</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Japertas</surname><given-names>Saulius</given-names></name><email xlink:href="mailto:saulius.japertas@ktu.lt">saulius.japertas@ktu.lt</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><aff id="j_INFORMATICA_aff_000">Kaunas University of Technology, Institute of Defense Technologies, Department of Applied Mathematics, Department of Telecommunications, Studentų 50, LT-51368 Kaunas, Lithuania</aff></contrib-group><pub-date pub-type="epub"><day>01</day><month>01</month><year>2010</year></pub-date><volume>21</volume><issue>2</issue><fpage>215</fpage><lpage>228</lpage><history><date date-type="received"><day>01</day><month>10</month><year>2008</year></date><date date-type="accepted"><day>01</day><month>05</month><year>2010</year></date></history><abstract><p>The asymmetric cipher protocol, based on decomposition problem in matrix semiring ℳ over semiring of natural numbers 𝒩 is presented. The security of presented cipher protocol is based on matrix decomposition problem (MDP), which is linked to the problem of solution of multivariate polynomial system of equations. Compromitation of proposed scheme relies on the solution of system of multivariate polynomial system of equations over the semiring of natural numbers 𝒩. The security parameters are defined, security analysis and implementation is presented.</p></abstract><kwd-group><label>Keywords</label><kwd>asymmetric cipher</kwd><kwd>matrix decomposition problem</kwd><kwd>one-way function</kwd></kwd-group></article-meta></front></article>