Dynamic Session Key Exchange Method using Two S-Boxes

نویسندگان

  • Sohail Abid
  • Shahid Abid
چکیده

This paper presents modifications of the Diffie-Hellman (DH) key exchange method. The presented modifications provide better security than other key exchange methods. We are going to present a dynamic security that simultaneously realizes all the three functions with a high efficiency and then give a security analysis. It also presents secure and dynamic key exchange method. Signature, encryption and key exchange are some of the most important and foundational Crypto-graphical tools. In most cases, they are all needed to provide different secure functions. On the other hand, there are also some proposals on the efficient combination of key exchange. In this paper, we present a dynamic, reliable and secure method for the exchange of session key. Moreover, the proposed modification method could achieve better performance efficiency.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware Implementation of Dynamic S-BOX to Use in AES Cryptosystem

One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...

متن کامل

Evolution of an Emerging Symmetric Quantum Cryptographic Algorithm

With the rapid evolution of data exchange in network environments, information security has been the most important process for data storage and communication. In order to provide such information security, the confidentiality, data integrity, and data origin authentication must be verified based on cryptographic encryption algorithms. This paper presents a new emerging trend of modern symmetri...

متن کامل

A New Algorithm to Construct Secure Keys for AES

In this paper we present new S8 S-boxes by using the action of symmetric group S8 on Advanced Encryption Standard S-box [3,] and use these S-boxes to construct 40320 keys. We apply these keys to Advanced Encryption Standard and propose a key exchange communication algorithm to make it more secure. This algorithm is suitable to exchange keys on insecure communication channels in order to achieve...

متن کامل

Anonymous Detection Based the Node Coverage Area Using Energy Efficient Dynamic Key Algorithm in Manet

We have used a Distributed Time Sequence Routing protocol (DTSR); The DTSR is used to locate the correct relay node and sink node for data transmission. In our wireless network is considered in to neighbor’s node in the network. Using the node data will be sending in to source to destination. To reduce the energy cost, nodes are active only during data transmission and the intersection of node ...

متن کامل

Improving Security of A Communication-efficient Three-party Password Authentication Key Exchange Protocol

Three-party Password-based Authentication Key Exchange (3PAKE) allows a trusted server to assist two users to establish a common session key. Recently, Wu et al. pointed out that Chang et al.’s 3PAKE was vulnerable to the off-line guessing attack and proposed an improved 3PAKE to fix the problem. However, we found that Wu et al.’s protocol is still subject to the off-line guessing attack. In ad...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1201.5443  شماره 

صفحات  -

تاریخ انتشار 2012