International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Information Security | India | Volume 6 Issue 6, June 2017

Improvement of Diffie-Hellman Key Exchange Algorithm

Gurshid

Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming. The purpose of this paper is to propose an algorithm which is an improvement over the Diffie-Hellman key exchange. The algorithm is based on using arithmetic and logarithmic calculations for transmission of the shared session keys which enable users to securely exchange keys which further can be used for later encryptions. Over time, Diffie-Hellman algorithm has been altered several times by various authors. However, some limitations to the Diffie-Hellman algorithm still persist. One of the limitations of the Diffie-Hellman algorithm is its time complexity when generating public keys. The proposed algorithm has similar grounds with the Diffie-Hellman algorithm, and a new technique is used for sharing session keys which overcome the time complexity limitation of the Diffie-Hellman algorithm. The proposed algorithm uses simple arithmetic and logarithmic equations to generate and exchange keys over an insecure network.

Keywords: Key Exchange, Diffie-Hellman Protocol, Security, Time Complexity

Edition: Volume 6 Issue 6, June 2017

Pages: 2628 - 2630


How to Cite this Article?

Gurshid, "Improvement of Diffie-Hellman Key Exchange Algorithm", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20174049, Volume 6 Issue 6, June 2017, 2628 - 2630

19 PDF Views | 18 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Security'

Case Studies, Information Security, India, Volume 9 Issue 1, January 2020

Pages: 1383 - 1386

Data Security in Day to Day Life and Its Consequences: Case Study

Sandeep Saxena

Share this article

Research Paper, Information Security, India, Volume 6 Issue 5, May 2017

Pages: 2124 - 2126

Protecting Organization?s Data through Penetration Testing

Prerak Doshi

Share this article

Research Paper, Information Security, Malaysia, Volume 6 Issue 12, December 2017

Pages: 1095 - 1098

Assessment of Cybersecurity Effectiveness in Serving Maqasid Al-Shariah

Yassir Izzadin, Jamaludin Ibrahim

Share this article

Research Paper, Information Security, India, Volume 6 Issue 6, June 2017

Pages: 2628 - 2630

Improvement of Diffie-Hellman Key Exchange Algorithm

Gurshid

Share this article

Informative Article, Information Security, India, Volume 6 Issue 5, May 2017

Pages: 2678 - 2678

Cyber Security - A Business Accelerator??

Riya V S, Dr. Aarthy C

Share this article

Top