Abstract
Transfer of data over a network is one of the most endangered things to look for. As the cases of data leaks and theft are increasing exponentially, there is a need of a secure gateway that can prevent the data from getting misused. In group-oriented application such as video conferencing and multi-player gaming, it is necessary that only the trusted member can access the data and that too in a confidential manner in such a way that the prowler is not able to modify or ingress it. The Diffie–Hellman algorithm was one of the first and foremost schemes used for key exchange using a symmetric key encryption technique. The proposed algorithm is an advanced version of the traditional Diffie–Hellman algorithm that can be used efficiently by increasing the time complexity of the current by a fair margin thus making it difficult for the intruder to decrypt the common key.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
May, P., Ehrlich, H.C., Steinke, T.: ZIB structure prediction pipeline: composing a complex biological workflow through web services. In: Nagel, W.E., Walter, W.V., Lehner, W. (eds.) Euro-Par 2006. LNCS, vol. 4128, pp. 1148–1158. Springer, Heidelberg (2006)
Tahir, R., Hu, H., Gu, D., McDonald-Maier, K., Howells, G: A scheme for the generation of strong ICMetrics based session key pairs for secure embedded system applications. In: 2013 27th International Conference on Advanced Information Networking and Applications Workshops (2013)
Taparia, A., Panigrahy, S.K., Jena, S.K.: Secure key exchange using enhanced Diffie-Hellman protocol based on string comparison. In: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (2017)
Arora, S.,Hussain, M.: Secure session key sharing using symmetric key cryptography. In: 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (2018)
Agarwal, A., Kumar, A.: Encoded IDs symmetric session key exchange. In: 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC) (2017)
Deshpande, P., Santhanalakshmi, S., Lakshmi, P., Vishwa, A.: Experimental study of Diffie-Hellman key exchange algorithm on embedded devices. In: 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS) (2017)
Kumari, S., Chaudhary, P., Chen, C.-M., Khan, M.K.: Questioning key compromise attack on Ostad-Sharif et al.’s authentication and session key generation scheme for healthcare applications 7 (2019) (IEEE Access)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Purohit, K., Kumar, A., Upadhyay, M., Kumar, K. (2020). Symmetric Key Generation and Distribution Using Diffie-Hellman Algorithm. In: Pant, M., Kumar Sharma, T., Arya, R., Sahana, B., Zolfagharinia, H. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 1154. Springer, Singapore. https://doi.org/10.1007/978-981-15-4032-5_14
Download citation
DOI: https://doi.org/10.1007/978-981-15-4032-5_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4031-8
Online ISBN: 978-981-15-4032-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)