Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol
نویسندگان
چکیده
One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which a widely used technique on systems around world depend. This protocol simple and uncomplicated, its robustness based Discrete Logarithm Problem (DLP). Despite this, he considered weak against man-in-the-middle attack. article presents completely different version DHP protocol. The proposed two verification stages. In first step, we check if pseudo-random value α that Alice sends to Bob has been manipulated! second make sure random β not manipulated. attacker Eve can impersonate neither nor Bob, manipulate their exchanged values, or discover secret encryption key.
منابع مشابه
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks
Group Diffie-Hellman schemes for password-based key exchange are designed to provide a pool of players communicating over a public network, and sharing just a human-memorable password, with a session key (e.g, the key is used for multicast data integrity and confidentiality). The fundamental security goal to achieve in this scenario is security against dictionary attacks. While solutions have b...
متن کاملA Secure Wireless Communication Protocol using Diffie - Hellman Key Exchange
In 1976, Diffie and Hellman in their path breaking paper [5] proposed a two party key agreement protocol based on finite field. Diffie – Hellman Key Exchange Protocol [DH protocol] has unique importance in two party wireless communication scenarios. After this protocol several protocols have been proposed bases on DH protocol but the Man in the middle attack raises a serious security concern on...
متن کاملProvably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using cryptographically secure keys), one must not allow any information to be leaked that would allow verification of the password (a weak shared key), since an attacker who obtains this information may be able to run an off-line dictionary attack to determine the correct password. ...
متن کاملAn Analysis of VoIP Secure Key Exchange Protocols against Man-in-the-Middle Attack
This paper presents a brief survey about the existing key exchange protocols namely MIKEY, ZRTP and SDES. The core features of these protocols and their suitability to SIP-VoIP Networks are analyzed in this paper. The focused research area in VoIP is related to the Security and Quality of service of the Voice data. Among these areas VoIP security and confidentiality of voice data turns to be a ...
متن کاملDiffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups
Author: Ayan Mahalanobis Title: Diffie-Hellman Key Exchange Protocol, its Generalization and Nilpotent Groups Dissertation Advisor: Dr. Spyros Magliveras Degree: Doctor of Philosophy Year: 2005 This dissertation has two chapters. In the first chapter we talk about the discrete logarithm problem, more specifically we concentrate on the Diffie-Hellman key exchange protocol. We survey the current ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JITEKI : Jurnal Ilmiah Teknik Elektro Komputer dan Informatika
سال: 2021
ISSN: ['2338-3062']
DOI: https://doi.org/10.26555/jiteki.v7i3.22210