Abstract of Improvement of Diffi, IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 221 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Information Security | India | Volume 6 Issue 6, June 2017


Improvement of Diffie-Hellman Key Exchange Algorithm

Gurshid


Abstract: Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming. The purpose of this paper is to propose an algorithm which is an improvement over the Diffie-Hellman key exchange. The algorithm is based on using arithmetic and logarithmic calculations for transmission of the shared session keys which enable users to securely exchange keys which further can be used for later encryptions. Over time, Diffie-Hellman algorithm has been altered several times by various authors. However, some limitations to the Diffie-Hellman algorithm still persist. One of the limitations of the Diffie-Hellman algorithm is its time complexity when generating public keys. The proposed algorithm has similar grounds with the Diffie-Hellman algorithm, and a new technique is used for sharing session keys which overcome the time complexity limitation of the Diffie-Hellman algorithm. The proposed algorithm uses simple arithmetic and logarithmic equations to generate and exchange keys over an insecure network.


Keywords: Key Exchange, Diffie-Hellman Protocol, Security, Time Complexity


Edition: Volume 6 Issue 6, June 2017,


Pages: 2628 - 2630


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Gurshid, "Improvement of Diffie-Hellman Key Exchange Algorithm", International Journal of Science and Research (IJSR), Volume 6 Issue 6, June 2017, pp. 2628-2630, https://www.ijsr.net/get_abstract.php?paper_id=ART20174049

Similar Articles with Keyword 'Security'

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Case Studies, Information Security, Singapore, Volume 13 Issue 11, November 2024

Pages: 183 - 184

Fortifying Electronic Medical Record (EMR) Applications: Advanced Security Controls in Oracle Cloud Infrastructure (OCI)

Velmurugan Dhakshnamoorthy

Share this Article

Downloads: 0

Analysis Study Research Paper, Information Security, United States of America, Volume 11 Issue 2, February 2022

Pages: 1376 - 1377

Beyond Baselines: Customizing Configuration Compliance for Industry-Specific Threat Models

Santosh Kumar Kande [6]

Share this Article
Top