International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 221 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Information Security | India | Volume 6 Issue 6, June 2017


Improvement of Diffie-Hellman Key Exchange Algorithm

Gurshid


Abstract: Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming. The purpose of this paper is to propose an algorithm which is an improvement over the Diffie-Hellman key exchange. The algorithm is based on using arithmetic and logarithmic calculations for transmission of the shared session keys which enable users to securely exchange keys which further can be used for later encryptions. Over time, Diffie-Hellman algorithm has been altered several times by various authors. However, some limitations to the Diffie-Hellman algorithm still persist. One of the limitations of the Diffie-Hellman algorithm is its time complexity when generating public keys. The proposed algorithm has similar grounds with the Diffie-Hellman algorithm, and a new technique is used for sharing session keys which overcome the time complexity limitation of the Diffie-Hellman algorithm. The proposed algorithm uses simple arithmetic and logarithmic equations to generate and exchange keys over an insecure network.


Keywords: Key Exchange, Diffie-Hellman Protocol, Security, Time Complexity


Edition: Volume 6 Issue 6, June 2017,


Pages: 2628 - 2630


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Gurshid, "Improvement of Diffie-Hellman Key Exchange Algorithm", International Journal of Science and Research (IJSR), Volume 6 Issue 6, June 2017, pp. 2628-2630, https://www.ijsr.net/get_abstract.php?paper_id=ART20174049

Similar Articles with Keyword 'Security'

Downloads: 0

Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021

Pages: 624 - 630

Secure Two Factor Authentication Framework based on Deep Learning

Talal Eid Alanzi | Dr. Mohammed Naif Alatawi

Share this Article

Downloads: 0

Comparative Studies, Information Security, India, Volume 12 Issue 6, June 2023

Pages: 2936 - 2951

Comparative Study between PCI-DSS v4.0 and ISO/IEC 27001:2022

Adesh Mukati | Dr. Astitwa Bhargava

Share this Article
Top