International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 221 | Views: 662 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Information Security | India | Volume 6 Issue 6, June 2017 | Popularity: 6.7 / 10


     

Improvement of Diffie-Hellman Key Exchange Algorithm

Gurshid


Abstract: Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming. The purpose of this paper is to propose an algorithm which is an improvement over the Diffie-Hellman key exchange. The algorithm is based on using arithmetic and logarithmic calculations for transmission of the shared session keys which enable users to securely exchange keys which further can be used for later encryptions. Over time, Diffie-Hellman algorithm has been altered several times by various authors. However, some limitations to the Diffie-Hellman algorithm still persist. One of the limitations of the Diffie-Hellman algorithm is its time complexity when generating public keys. The proposed algorithm has similar grounds with the Diffie-Hellman algorithm, and a new technique is used for sharing session keys which overcome the time complexity limitation of the Diffie-Hellman algorithm. The proposed algorithm uses simple arithmetic and logarithmic equations to generate and exchange keys over an insecure network.


Keywords: Key Exchange, Diffie-Hellman Protocol, Security, Time Complexity


Edition: Volume 6 Issue 6, June 2017


Pages: 2628 - 2630



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Gurshid, "Improvement of Diffie-Hellman Key Exchange Algorithm", International Journal of Science and Research (IJSR), Volume 6 Issue 6, June 2017, pp. 2628-2630, https://www.ijsr.net/getabstract.php?paperid=ART20174049, DOI: https://www.doi.org/10.21275/ART20174049



Similar Articles

Downloads: 3 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Case Studies, Information Security, Singapore, Volume 13 Issue 11, November 2024

Pages: 183 - 184

Fortifying Electronic Medical Record (EMR) Applications: Advanced Security Controls in Oracle Cloud Infrastructure (OCI)

Velmurugan Dhakshnamoorthy

Share this Article

Downloads: 0

Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021

Pages: 624 - 630

Secure Two Factor Authentication Framework based on Deep Learning

Talal Eid Alanzi, Dr. Mohammed Naif Alatawi

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Security, India, Volume 11 Issue 2, February 2022

Pages: 148 - 151

Formulating Operating System Anonymization by Monolithic Keyring Subsystem Fabrication

Ujas Dhami, Nisarg Shah

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Information Security, Malaysia, Volume 13 Issue 8, August 2024

Pages: 738 - 747

Assessing Cybersecurity Threats and Awareness in Bosaso's Banking and Telecom Sectors

Mohamed Abdirisak Buraale, Dr. Tiktik Khawa Abdurrahman, Dr. Fazilah Che Fauzi

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Information Security, United States of America, Volume 11 Issue 12, December 2022

Pages: 1404 - 1405

Next - Generation SIEM: The Shift Towards Extended Detection and Response (XDR)

Santosh Kumar Kande, Alex Harris

Share this Article



Top