Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol

نویسندگان

چکیده

One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which a widely used technique on systems around world depend. This protocol simple and uncomplicated, its robustness based Discrete Logarithm Problem (DLP). Despite this, he considered weak against man-in-the-middle attack. article presents completely different version DHP protocol. The proposed two verification stages. In first step, we check if pseudo-random value α that Alice sends to Bob has been manipulated! second make sure random β not manipulated. attacker Eve can impersonate neither nor Bob, manipulate their exchanged values, or discover secret encryption key.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks

Group Diffie-Hellman schemes for password-based key exchange are designed to provide a pool of players communicating over a public network, and sharing just a human-memorable password, with a session key (e.g, the key is used for multicast data integrity and confidentiality). The fundamental security goal to achieve in this scenario is security against dictionary attacks. While solutions have b...

متن کامل

A Secure Wireless Communication Protocol using Diffie - Hellman Key Exchange

In 1976, Diffie and Hellman in their path breaking paper [5] proposed a two party key agreement protocol based on finite field. Diffie – Hellman Key Exchange Protocol [DH protocol] has unique importance in two party wireless communication scenarios. After this protocol several protocols have been proposed bases on DH protocol but the Man in the middle attack raises a serious security concern on...

متن کامل

Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman

When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using cryptographically secure keys), one must not allow any information to be leaked that would allow verification of the password (a weak shared key), since an attacker who obtains this information may be able to run an off-line dictionary attack to determine the correct password. ...

متن کامل

An Analysis of VoIP Secure Key Exchange Protocols against Man-in-the-Middle Attack

This paper presents a brief survey about the existing key exchange protocols namely MIKEY, ZRTP and SDES. The core features of these protocols and their suitability to SIP-VoIP Networks are analyzed in this paper. The focused research area in VoIP is related to the Security and Quality of service of the Voice data. Among these areas VoIP security and confidentiality of voice data turns to be a ...

متن کامل

Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups

Author: Ayan Mahalanobis Title: Diffie-Hellman Key Exchange Protocol, its Generalization and Nilpotent Groups Dissertation Advisor: Dr. Spyros Magliveras Degree: Doctor of Philosophy Year: 2005 This dissertation has two chapters. In the first chapter we talk about the discrete logarithm problem, more specifically we concentrate on the Diffie-Hellman key exchange protocol. We survey the current ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: JITEKI : Jurnal Ilmiah Teknik Elektro Komputer dan Informatika

سال: 2021

ISSN: ['2338-3062']

DOI: https://doi.org/10.26555/jiteki.v7i3.22210