An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 118 , Downloads: 105 | CTR: 89 % | Weekly Popularity: ⮙5

Research Paper | Computer Science & Engineering | Iraq | Volume 5 Issue 11, November 2016

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Security is one of the most imperative commentaries in contemporary era. Especially, in terms of creating a safe channel. Create secure channel means the protection of information against an invader during exchanging the data through channel. Many procedures suggested overcoming this problem like cryptography, steganography, biometrics.etc. In this paper, the propose system consist of two stages the first is generated key called image key from an image while the second stage is applied Diffie Hellman based on the key which is created from the first step. The image key in our system is used instead of the two numbers which are needed compulsory in Hilleman algorithm. In our proposal two client will not need to agree previously about the two numbers (prime and integer) which are basically the requirements in d, h algorithm to generate the shared key which should be used in ciphering process in advance. Moreover, the exchange key as a part of Diffie Hellman algorithm will be exchanged between parties through hiding it in own copy image of each party in specific position which are selected based on image key that are created in the first stage.The hiding process support a secure channel for two parties to exchange their keys securely. Moreover, support securely channel is done with keeping quality of stego- image due to limitation pixels which are used for hiding process.in addition the hiding process is applied in high bit plane 8th lsb to make it immune against channel effected like noise or compression. The system has been proved truly and the image key generated completely and exchange keys exchanged truly even if the channel has some effect on image like noise or compression.

Keywords: image key, shared key, exchange key, asymmetric, prime number

Edition: Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

Share this Article

How to Cite this Article?

Zainalabideen Abdullsamd Rasheed, "An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20163127, Volume 5 Issue 11, November 2016, 1654 - 1660

118 PDF Views | 105 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'shared key'

Views: 118 , Downloads: 105 | CTR: 89 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Share this Article

Views: 154 , Downloads: 120 | CTR: 78 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 423 - 427

Energy Consumption in Key Management Operations in WSNs

Ramandeep Singh, Amandeep Kaur Virk

Share this Article

Views: 153 , Downloads: 140 | CTR: 92 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 280 - 285

Web Application based Authentication Schemes to Resist Password Reuse and Password Stealing Attacks

Tanzila Maqsood Mirza, Shrikant R. Tandle

Share this Article

Views: 150 , Downloads: 145 | CTR: 97 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 69 - 74

Shared Key Based Jamming Mitigation in Wireless Network using Diffie Hellman Elliptic Curve Cryptography

S. Rajeswari, Dr V. Anuratha

Share this Article

Similar Articles with Keyword 'exchange key'

Views: 118 , Downloads: 105 | CTR: 89 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Share this Article

Views: 140 , Downloads: 138 | CTR: 99 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, Indonesia, Volume 5 Issue 11, November 2016

Pages: 102 - 104

Study of Three Pass Protocol on Data Security

Robbi Rahim, Ali Ikhwan

Share this Article

Similar Articles with Keyword 'asymmetric'

Views: 133 , Downloads: 101 | CTR: 76 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Views: 118 , Downloads: 105 | CTR: 89 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Share this Article

Views: 145 , Downloads: 108 | CTR: 74 %

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2810 - 2816

Parallelization of Symmetric and Asymmetric security Algorithms for MultiCore Architectures

T. Balamurugan, T. Hemalatha

Share this Article

Views: 129 , Downloads: 109 | CTR: 84 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1925 - 1928

A Survey on Asymmetric Key Aggregate Encryption in Data Sharing

Shilpashree P, Dr. K. N. Narasimha Murthy

Share this Article

Views: 131 , Downloads: 112 | CTR: 85 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 968 - 972

Fuzzy Based Fully Homomorphic Encryption Scheme for Security in Cloud Computing

Navjeet Singh, Rimple Ahuja

Share this Article

Similar Articles with Keyword 'prime number'

Views: 118 , Downloads: 105 | CTR: 89 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Share this Article

Views: 184 , Downloads: 152 | CTR: 83 % | Weekly Popularity: ⮙4

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 132 - 135

Application of Prime Numbers in Computer Science and the Algorithms Used To Test the Primality of a Number

Tejash Desai

Share this Article
Top