The aim of this research is to compare the existing Diffie Hellman Algorithm and the proposed, Advancement in Diffie Hellman Algorithm. The Diffie Hellman algorithm is used to generate a secret key for secure transactions and communication at organizations. In Advanced Diffie Hellman Algorithm, we apply certain mathematical algorithms at both the ends, that is, sender and receiver, in order to make the communication more secure. Thus, the information sent from one end to the other would be in encrypted form, making it difficult to decipher.
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodIDES Editor
This paper presents an algorithm which is hybrib of
Transposition and Substitution method.The main advantage
of this approach is ,it doesn’t use any key from outside because
key is present within the original message.Due to this the
main problem of exchanging keys securely is solved.Both Transposition
and Substitution method have their own limitations.So
we use both these method so that the resultant cipher is more
secure and strong.
Presentation of the article "Profiling Java Programs for Parallelism" of C. Hammacher, K. Streit, S. Hack and A. Zeller. All Rights for text are Reserved by authors of this paper.
Date of presentation: July 2011
For preparing my slides I take pictures and some other information from the internet and I try to use only legal one. But if I did not notice something and you have Rights for any kind of this information and do not want to see it in the presentation please let me know and I will remove it from the slides as fast as possible or remove the slides themselves. Thanks for your collaboration.
The Diffie-Hellman algorithm was developed by Whitfield Diffie and Martin Hellman in 1976.
This algorithm was devices not to encrypt the data but to generate same private cryptographic key at both ends so that there is no need to transfer this key from one communication end to another.
Diffie – Hellman algorithm is an algorithm that allows two parties to get the shared secret key using the communication channel, which is not protected from the interception but is protected from modification.
In this paper we study of the MOR cryptosystem using camina group. We show that using the automorphism of the camina group one can build a secure MOR cryptosystem.
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodIDES Editor
This paper presents an algorithm which is hybrib of
Transposition and Substitution method.The main advantage
of this approach is ,it doesn’t use any key from outside because
key is present within the original message.Due to this the
main problem of exchanging keys securely is solved.Both Transposition
and Substitution method have their own limitations.So
we use both these method so that the resultant cipher is more
secure and strong.
Presentation of the article "Profiling Java Programs for Parallelism" of C. Hammacher, K. Streit, S. Hack and A. Zeller. All Rights for text are Reserved by authors of this paper.
Date of presentation: July 2011
For preparing my slides I take pictures and some other information from the internet and I try to use only legal one. But if I did not notice something and you have Rights for any kind of this information and do not want to see it in the presentation please let me know and I will remove it from the slides as fast as possible or remove the slides themselves. Thanks for your collaboration.
The Diffie-Hellman algorithm was developed by Whitfield Diffie and Martin Hellman in 1976.
This algorithm was devices not to encrypt the data but to generate same private cryptographic key at both ends so that there is no need to transfer this key from one communication end to another.
Diffie – Hellman algorithm is an algorithm that allows two parties to get the shared secret key using the communication channel, which is not protected from the interception but is protected from modification.
In this paper we study of the MOR cryptosystem using camina group. We show that using the automorphism of the camina group one can build a secure MOR cryptosystem.
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
Testing the Numerical Precisions Required to Execute Real World Programs ijseajournal
The IEEE 754 Standard for floating point number formats is over 30 years old. Computational
requirements have changed dramatically during these 30 years. This paper describes methods by which,
for a given program required to yield results of a given accuracy, one may determine:
1) whether the choices of numerical precision are adequate;
2) the minimum numerical precisions actually required;
3) the statements most vulnerable to loss of precision.
Precision is specified as an exact number of mantissa bits for each real kind.
The method is applied to two small Fortran simulation programs with surprising results. The implications
are that considerable savings could be made in computer hardware by computing with reduced precision,
and that speed improvements may be made on existing systems by packing data for inter-processor
communication, removing those parts of the bit patterns which are not needed.
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
Elliptic curve cryptography is the most efficient public key encryption scheme based on the elliptic curve concepts that
can be used to create faster, smaller, and efficient cryptographic keys. As a use of network increase for critical transaction, so
huge damages are caused by intrusion attacks hence there is the need of computer network security. To protect network against
various active and passive attack, various technique have been suggested. Mobile devices have many differences in their
capabilities, computational powers and security requirements. The security of mobile communication has stopped the list of
concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication.
This is a description of the Diffie-Hellman-Merkle Key Exchange process, with a presentation of the essential calculations and some discussion of vulnerabilities
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementationinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Design And Implementation Of Tiny Encryption AlgorithmIJERA Editor
Over the recent years, several smart applications like RFID‟s, sensor networks, including industrial systems, critical infrastructures, private and public spaces as well as portable and wearable applications in which highly constrained devices are interconnected, typically communicating wirelessly with one another, working in concert to accomplish some task. Advanced safety and security mechanisms can be very important in all of these areas. Light weight cryptography enables secure and efficient communication between networked smart objects. This proposed system focuses on the FPGA implementation of light weight cryptographic algorithm Tiny Encryption Algorithm TEA to adapt with many real time constraints such as memory, data loss and low cost. The proposed scheme uses Linear Feedback Shift Register to generate the random key making it more secure for sensitive information transfer in many real-time applications. In this study,operation of this cryptosystem is analyzed by implementing the cryptographic algorithm TEA with the key generation unit in FPGA Spartan 3E. We have also compared the results with the IDEA.
Efficient asic architecture of rsa cryptosystemcsandit
This paper presents a unified architecture design of the RSA cryptosystem i.e. RSA cryptoaccelerator
along with key-pair generation. A structural design methodology for the same is
proposed and implemented. The purpose is to design a complete cryptosystem efficiently with
reduced hardware redundancy. Individual modular architectures of RSA, Miller-Rabin Test and
Extended Binary GCD algorithm are presented and then they are integrated. Standard
algorithm for RSA has been used. The RSA datapath has further been transformed into DPA
resistant design. The simulation and implementation results using 180nm technology are shown
and prove the validity of the architecture.
Cryptography is the combination of Mathematics and Computer science. Cryptography is used for encryption and decryption of data using mathematics. Cryptography transit the information in an illegible manner such that only intended recipient will be able to decrypt the information
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
Testing the Numerical Precisions Required to Execute Real World Programs ijseajournal
The IEEE 754 Standard for floating point number formats is over 30 years old. Computational
requirements have changed dramatically during these 30 years. This paper describes methods by which,
for a given program required to yield results of a given accuracy, one may determine:
1) whether the choices of numerical precision are adequate;
2) the minimum numerical precisions actually required;
3) the statements most vulnerable to loss of precision.
Precision is specified as an exact number of mantissa bits for each real kind.
The method is applied to two small Fortran simulation programs with surprising results. The implications
are that considerable savings could be made in computer hardware by computing with reduced precision,
and that speed improvements may be made on existing systems by packing data for inter-processor
communication, removing those parts of the bit patterns which are not needed.
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
Elliptic curve cryptography is the most efficient public key encryption scheme based on the elliptic curve concepts that
can be used to create faster, smaller, and efficient cryptographic keys. As a use of network increase for critical transaction, so
huge damages are caused by intrusion attacks hence there is the need of computer network security. To protect network against
various active and passive attack, various technique have been suggested. Mobile devices have many differences in their
capabilities, computational powers and security requirements. The security of mobile communication has stopped the list of
concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication.
This is a description of the Diffie-Hellman-Merkle Key Exchange process, with a presentation of the essential calculations and some discussion of vulnerabilities
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementationinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Design And Implementation Of Tiny Encryption AlgorithmIJERA Editor
Over the recent years, several smart applications like RFID‟s, sensor networks, including industrial systems, critical infrastructures, private and public spaces as well as portable and wearable applications in which highly constrained devices are interconnected, typically communicating wirelessly with one another, working in concert to accomplish some task. Advanced safety and security mechanisms can be very important in all of these areas. Light weight cryptography enables secure and efficient communication between networked smart objects. This proposed system focuses on the FPGA implementation of light weight cryptographic algorithm Tiny Encryption Algorithm TEA to adapt with many real time constraints such as memory, data loss and low cost. The proposed scheme uses Linear Feedback Shift Register to generate the random key making it more secure for sensitive information transfer in many real-time applications. In this study,operation of this cryptosystem is analyzed by implementing the cryptographic algorithm TEA with the key generation unit in FPGA Spartan 3E. We have also compared the results with the IDEA.
Efficient asic architecture of rsa cryptosystemcsandit
This paper presents a unified architecture design of the RSA cryptosystem i.e. RSA cryptoaccelerator
along with key-pair generation. A structural design methodology for the same is
proposed and implemented. The purpose is to design a complete cryptosystem efficiently with
reduced hardware redundancy. Individual modular architectures of RSA, Miller-Rabin Test and
Extended Binary GCD algorithm are presented and then they are integrated. Standard
algorithm for RSA has been used. The RSA datapath has further been transformed into DPA
resistant design. The simulation and implementation results using 180nm technology are shown
and prove the validity of the architecture.
Cryptography is the combination of Mathematics and Computer science. Cryptography is used for encryption and decryption of data using mathematics. Cryptography transit the information in an illegible manner such that only intended recipient will be able to decrypt the information
Survey: Elliptic Curve Cryptography using Scalar Multiplication AlgorithmsAM Publications
Stopping unauthorized access to corporate information systems is crucial for many organizations. In which
Communication security is playing one of the key area of interest to protect the sensitive/valuable data. The data used in
communication is very sensitive/valuable and needs to be protected and made abstract from intruders of system or over the
network. The recent way to provide precious security mechanism of Network security is Cryptography using Elliptic Curve
architectures which is based on the arithmetic of elliptic curves and discrete logarithmic problems. ECC schemes are public-key
based mechanisms that provide Cipher text (Encryption), digital signatures and key exchange algorithms. The most crucial
operation in the cryptosystem is the scalar multiplication operation. In this paper, we study various scalar multiplication
algorithms with respect to the efficiency, weight and features etc. This paper gives an idea about algorithms and the areas where
we need to researchers can proceed further in the computation of cryptosystem.
In today's high technology environment, organizations are becoming more and more dependent on their information systems. The public is increasingly concerned about the proper use of information, particularly personal data. The threats to information systems from criminals and terrorists are increasing. Many organizations will identify information as an area of their operation that needs to be protected as part of their system of internal control.
Computer and Network Security is the collection of technologies, standards, policies and management practices that are used in order to obtain a high level of security.
The aim of this course is to explore security fundamentals related to computer data, information and Network. It details the methods of attacks along with security principles.
The official learning outcome for this course is: Upon successful completion of the course the students:
• Must know the basic concepts related to computer and network security.
• Must know how to apply the techniques related to data and information.
A combination of lectures and practical sessions will be used in this course in order to achieve the aim of the course.
By MSc. Karwan Mustafa Kareem
Elliptic Curve Cryptography and Zero Knowledge ProofArunanand Ta
Elliptic Curve Cryptography and Zero Knowledge Proof
Presentation by Nimish Joseph, at College of Engineering Cherthala, Kerala, India, during Faculty Development Program, on 06-Nov-2013
Key management in information centric networkingIJCNCJournal
Information centric networking (ICN) has been in the spotlight of recent research. It is an emerging
communication paradigm that relays on the concept of publish and subscribe. It aims to revise the current
Internet with a new clean slate architecture where the design is completely different from today’s location
based model. To secure the forwarding plan in this network, it is vital to have a time based transient
forwarding identifiers by periodically changing the network link identifiers. This assumes shared keys to be
distributed prior the communications between an entity termed topology manager (TM) and each forwarder
in the network. Exchanging and sharing a secret key between two parties is one of most critical functions in
cryptography that needs to be more concerned when integrating cryptographic functions into the system. As
ICN is brand new Internet architecture, many existing cryptography protocols may need to be redesigned
to fit this new architecture. Therefore, this paper focuses on the security aspect of ICN and proposes an
initial design to deploy the integrated Diffie-Hellman-DSA key exchange protocol as a key distributions
mechanism.
Elliptic Curve Cryptography for those who are afraid of mathsMartijn Grooten
A low level introduction into elliptic curve cryptography, as presented at BSides San Francisco 2016.
NB don't be put off by the 100 slides; every transition is on its own slide.
International Journal of Computational Engineering Research(IJCER) ijceronline
nternational Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Implementation and Secured Authentication Key using Elliptic Curve CryptographyAM Publications,India
The Elliptic Curve Cryptosystem (ECC) is an emerging alternative for traditional public key cryptosystem like RSA, DSA and Diffie-Hellman. It provides the highest strength- per-bit of any Cryptosystem known today with smaller key sizes resulting in faster computation and memory. Diffie – Hellman key exchange the protocol based on Elliptic curve cryptography. ECC techniques such as RSA is that the best known algorithm for solving ECDL the underlying hard mathematical in Scalar multiplication problem in ECC.
Public Key Cryptosystems with Applications, Requirements and
Cryptanalysis, RSA algorithm, its computational aspects and security, Diffie-Hillman Key Exchange algorithm, Man-in-Middle attack
DYNAMIC SESSION KEY EXCHANGE METHOD USING TWO S-BOXESIJCSEA Journal
This paper presents modifications of the Diffie-Hellman (DH) key exchange method. The presented modifications provide better security than other key exchange methods. We are going to present a dynamic security that simultaneously realizes all the three functions with a high efficiency and then give a security analysis. It also presents secure and dynamic key exchange method. Signature, encryption and key exchange are some of the most important and foundational Crypto-graphical tools. In most cases, they are all needed to provide different secure functions. On the other hand, there are also some proposals on the efficient combination of key exchange. In this paper, we present a dynamic, reliable and secure method for the exchange of session key. Moreover, the proposed modification method could achieve better performance efficiency.
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARDijait
Smart cards improve the convenience and security of any transaction. They provide tamper-proof storage of user and account identity. Multifunction cards are used to manage network system access, store value and other data. The cards carry personal account, credit and buying-preference information and thus, security becomes a primary issue here. Public Key Cryptography plays an essential role in electronic
banking and financial transactions. ECC is one of the best public key techniques for its small key size, high security and is suitable for secure access of smart cards. This article gives principles of public key cryptography, illustrates two cryptographic algorithms RSA and ECC. The elliptic curve cryptography is implemented on smart card using Menezes-Vanstone Elliptic Curve Cryptosystem and Nyberg-Rueppel
Signature Scheme [2]. The implementation of these algorithms is done using Java Card technology. The test results are analysed and comparison about the public key sizes and security aspects are also discussed.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
1. Monalisa Jha Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 4) July 2015, pp.01-02
www.ijera.com 1 | P a g e
Advancement in Diffie-Hellman algorithm
Monalisa Jha, Shraddha Patil
(Department of Electronics and Telecommunication, Symbiosis international University, Pune-46)
(Department of Electronics and Telecommunication, Symbiosis international University, Pune-46)
ABSTRACT
The aim of this research is to compare the existing Diffie Hellman Algorithm and the proposed, Advancement in
Diffie Hellman Algorithm. The Diffie Hellman algorithm is used to generate a secret key for secure transactions
and communication at organizations. In Advanced Diffie Hellman Algorithm, we apply certain mathematical
algorithms at both the ends, that is, sender and receiver, in order to make the communication more secure. Thus,
the information sent from one end to the other would be in encrypted form, making it difficult to decipher.
Keywords - Diffie-Hellman, authentication mechanism, key exchange
I. INTRODUCTION
The year 1976 marked as a landmark period in
which the famous Diffie Hellman key exchange
cryptography emerged. This first practical method
intends to produce private secret key shared over a
public medium or a public channel. Diffie-Hellman
key exchange is widely used to establish session keys
in Internet protocols. It is the main key exchange
mechanism in SSH (secure shell) and IPSec (IP
security) and a popular option in TLS (transport layer
security).Diffie Hellman is commonly implemented
and deployed with these protocols and we find that,
in practice, it frequently offers less security than
widely believed. [2] In this paper, we intend to take
the concept of key exchange by Diffie Hellmen
forward and induce methods to secure this key
exchange algorithm by using simple mathematical
algorithms. The mathematics behind this algorithm is
conceptually simple and includes [1] the algebra of
exponents and modulus arithmetic. The new
algorithm is called Advancement in Diffie Hellman
Algorithm.
II. DIFFIE HELLMAN ALGORITHM
For this discussion we will use Alice and Bob,
two of the most widely traveled Internet users in
cyberspace, to demonstrate the Diffie Hellman key
exchange. [3]
Table 1 shows the Diffie Hellman key
exchange algorithm.
Table 1: Diffie Hellman algorithm
Alice Bob
Alice chooses secret
number ‘a’
Bob chooses secret
number ‘b’.
Calculates (g^a)mod p Calculates (g^b)mod p
This value is sent to Bob This value is sent to
Alice
Alice has now (g^b)mod p Bob now has (g^a)mod p
Let us assign this as Let us assign
‘Bob_value’ ‘Alice_value’
Now Alice calculates
(g^(Bob_value))^a mod p
Now Bob calculates
(g^(Alice_value))^a mod
p
This value is secret value This value is secret value
III. THE ADVANCED DIFFIE HELLMAN
ALGORITHM
The Advanced Diffie Hellman algorithm has
been proposed in order to make the original Diffie
Hellman algorithm more secure. Our main aim here
is to compute the values of secret number chosen by
the two organizations using certain mathematical
algorithm. This would ensure the confidentiality of
the chosen values of ‘a’ and ‘b;, that is the secret
number.
Our next aim would be to secure the data sent
from one organization to another. Alice sends the
value (ga
modp) to Bob in the original Diffie Hellman,
but here we have cubed this value and then sent to
Bob. This would make man in the middle attack more
difficult. With this as the area of focus, we hereby
propose the Advanced Diffie Hellman. Fig.2 shows
the Advanced Diffie Hellman algorithm.
Alice Bob
Calculate (p+a). calculate (p+b)
Multiply (p+a) with p. Multiply (p+b) with p.
find mod of complex_1
i.e.((p+a)*p)%g
find mod of complex_2
i.e.((p+b)*p)%g
Put this value of the
above in complex_1.
Put this value of the
above in complex_2.
Calculate the square of
(complex_1) ^2.
Calculate the square of
(complex_2)^2
This value is again
added to compex_1.
This value is again added
to compex_2.
Calculate the square of
(complex_1) ^2.
Calculate the square of
(complex_2)^2
This value is again
added to compex_1.
This value is again added
to compex_2.
RESEARCH ARTICLE OPEN ACCESS
2. Monalisa Jha Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 7, (Part - 4) July 2015, pp.01-02
www.ijera.com 2 | P a g e
This new values is
called new_complex_1
This new value is called
new_complex_1
a1=g^(new_complex_1)
mod p
b1=g^(new_complex_2)
mod p
Take cube of a1 Take cube of b1
(a1^3) is sent to Bob (b1^3) is sent to Alice
IV. ADVANTAGES OF THE ADVANCED
DIFFIE HELLMAN ALGORITHM
Complexity - The complexity of the algorithm is
increased. Values of the chosen number ‘a’ and ‘b’
are made complex. If a cryptanalyst tracks down the
values of the chosen numbers, it would be difficult to
decrypt and find ‘a’ and ‘b’. The cryptanalyst would
be finding only a1 and b1.
Man in the middle attack - If an attacker finds
the data being sent from Alice to Bob, he would be
capturing (a1^3) or (b1^3). It would make the task
difficult to arrive at the actual value since the actual
values are cubed and then sent.
Security - The Diffie Hellman code had no
security over the chosen secret key ‘a’ and ‘b’. If the
cryptanalyst deciphered the values of and b, the
secret key would be obtained. In the Advancement
Diffie Hellman, the values of ‘a’ and ‘b’ have been
encrypted. Even if the values of ‘a’ and ‘b’ are
deciphered, this algorithm would make the values
more secure.
Reverse process - Reverse engineering or reverse
process would be very difficult for the cryptanalyst.
The major advantage of this algorithm is that the
users are making their own secret numbers more
secure by performing algorithms at their own end.
V. CONCLUSION
The Diffie Hellman key generation protocol did
not have any mechanism to secure the secret key of
the two parties involved. We have introduced certain
operations to make the attack more difficult.
However, various other implementations are possible.
When the data is sent from one party to another,
instead of cubing, one can introduce some other
operations as well.
Acknowledgements
We gratefully acknowledge the contributions of
our guiding light, our professor, Mrs Dipti Kapoor
Sarmah, who showed us the direction and cleared
our doubts.
REFERENCES
Journal Papers:
[1] Preeti and Bandana Sharma, “ Review Paper
on Security in Diffie-Hellman Algorithm,”
Volume 4, Issue 3, March 2014.
[2] David A. Carts, “A Review of the Diffie-
Hellman Algorithm and its Use in Secure
Internet Protocols,” SANS Institute Reading
Room site.
[3] Paul C. Kocher, “Timing Attacks on
Implementations of Diffe-Hellman, RSA,
DSS, and Other Systems,” Cryptography
Research Inc.,CA 94105,USA.
[4] P. Bhattacharya, M. Debbabi & H. Otrok,
“Improving the Diffie-Hellman Secure Key
Exchange”, International Conference on
Wireless Networks, Communications &
Mobile Computing in 2005.
[5] Vishal Garg, Rishu,”Improved Diffie-
Hellman Algorithm for Network Security
Enhancement”, Int.J.Computer Technology
& Applications,Vol 3(4),1327-1331IJCTA
|July-August 2012 .
[6] Raphael C.-W. Phan, “Fixing the Integrated
Diffie-Hellman-DSA Key Exchange
Protocol” , IEEE COMMUNICATIONS
LETTERS, VOL. 9, NO. 6, JUNE 2005.
[7] L. Harn, W.-J. Hsin & M. Mehta,”
Authenticated Diffie–Hellman key
agreement protocol using a single
cryptographic assumption”, IEEE Proc.-
Commun., Vol. 152, No. 4, August 2005.
Books:
[8] William Stallings, “Cryptography and
Network Security :Principles and Practice”,
5th Edition, Pearson education.
[9] Behrouz Forouzan , Debdeep
Mukhopadhyay, “ Cryptography and
Network Security”, 2nd Edition, Tata
McGraw-Hill Education.