Downloads: 221 | Views: 662 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Information Security | India | Volume 6 Issue 6, June 2017 | Popularity: 6.7 / 10
Improvement of Diffie-Hellman Key Exchange Algorithm
Gurshid
Abstract: Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming. The purpose of this paper is to propose an algorithm which is an improvement over the Diffie-Hellman key exchange. The algorithm is based on using arithmetic and logarithmic calculations for transmission of the shared session keys which enable users to securely exchange keys which further can be used for later encryptions. Over time, Diffie-Hellman algorithm has been altered several times by various authors. However, some limitations to the Diffie-Hellman algorithm still persist. One of the limitations of the Diffie-Hellman algorithm is its time complexity when generating public keys. The proposed algorithm has similar grounds with the Diffie-Hellman algorithm, and a new technique is used for sharing session keys which overcome the time complexity limitation of the Diffie-Hellman algorithm. The proposed algorithm uses simple arithmetic and logarithmic equations to generate and exchange keys over an insecure network.
Keywords: Key Exchange, Diffie-Hellman Protocol, Security, Time Complexity
Edition: Volume 6 Issue 6, June 2017
Pages: 2628 - 2630
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 3 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Case Studies, Information Security, Singapore, Volume 13 Issue 11, November 2024
Pages: 183 - 184Fortifying Electronic Medical Record (EMR) Applications: Advanced Security Controls in Oracle Cloud Infrastructure (OCI)
Velmurugan Dhakshnamoorthy
Downloads: 0
Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021
Pages: 624 - 630Secure Two Factor Authentication Framework based on Deep Learning
Talal Eid Alanzi, Dr. Mohammed Naif Alatawi
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Security, India, Volume 11 Issue 2, February 2022
Pages: 148 - 151Formulating Operating System Anonymization by Monolithic Keyring Subsystem Fabrication
Ujas Dhami, Nisarg Shah
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Information Security, Malaysia, Volume 13 Issue 8, August 2024
Pages: 738 - 747Assessing Cybersecurity Threats and Awareness in Bosaso's Banking and Telecom Sectors
Mohamed Abdirisak Buraale, Dr. Tiktik Khawa Abdurrahman, Dr. Fazilah Che Fauzi
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Information Security, United States of America, Volume 11 Issue 12, December 2022
Pages: 1404 - 1405Next - Generation SIEM: The Shift Towards Extended Detection and Response (XDR)
Santosh Kumar Kande, Alex Harris