# An Approach Towards Encrypting Paired Digits Using Dynamic Programming and Diffie-Hellman Key Exchange

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1192)

## Abstract

Cryptography has gone through tremendous evolution in recent years. But the concept of enciphering text was started in 1900 BC. There have been many modifications to older cryptography as well as profound discoveries have been made in this field. Likewise, this paper proposes a cryptographic technique that uses the idea of the Diffie-Hellman key Exchange to share a common key. This key-value behaves as a seed value in the formation of key sequences. A methodology has been proposed to encrypt paired digits using dynamic programming. Based on the shared common key, a table is generated on both sides of the sender and receiver to have a common data set. This data set helps in encryption and decryption both. The dynamic table uses the Fibonacci series and recursive functions to fill the table. Decryption needs searching operation in the receiver’s table which would search for (x, y) pair. This (x, y) pair is concatenated to produce plain text.

## Keywords

Cryptography Diffie-Hellman key exchange Fibonacci sequences Dynamic programming Non Redundant Cipher (NRC) Key Sequence (KS) Table Generation (TG) Common Key (CK)

## References

1. 1.
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
2. 2.
Stallings, W.: Cryptography and Network Security, 4th edn. Pearson Education, India (2006)Google Scholar
3. 3.
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms. MIT Press, Cambridge (2009)
4. 4.
Horadam, A.F.: A generalized Fibonacci sequence. Am. Math. Mon. 68(5), 455–459 (1961)
5. 5.
Bodur, H., Kara, R.: Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission. In: 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN), pp. 144–147. IEEE (2017)Google Scholar
6. 6.
Hu, Z., Zhu, Y., Ma, L.: An improved Kerberos protocol based on Diffie-Hellman-DSA key exchange. In: 2012 18th IEEE International Conference on Networks (ICON), pp. 400–404. IEEE (2012)Google Scholar
7. 7.
Ibrahem, M.K.: Modification of Diffie-Hellman key exchange algorithm for zero knowledge proof. In: 2012 International Conference on Future Communication Networks, pp. 147–152. IEEE, April 2012Google Scholar
8. 8.
Velten, M.: Zero-Knowledge, the Magic of Cryptography. Saarland University, August 2006Google Scholar
9. 9.
Taparia, A., Panigrahy, S.K., Jena, S.K.: Secure key exchange using enhanced Diffie-Hellman protocol based on string comparison. In: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 722–726. IEEE (2017)Google Scholar
10. 10.
Deshpande, P., Santhanalakshmi, S., Lakshmi, P., Vishwa, A.: Experimental study of Diffie-Hellman key exchange algorithm on embedded devices. In: 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), pp. 2042–2047. IEEE (2017)Google Scholar
11. 11.
Yusfrizal, Y., Meizar, A., Kurniawan, H., Agustin, F.: Key management using combination of Diffie-Hellman key exchange with AES encryption. In: 2018 6th International Conference on Cyber and IT Service Management (CITSM), pp. 1–6. IEEE (2018)Google Scholar
12. 12.
Mehibel, N., Hamadouche, M.H.: A new approach of elliptic curve Diffie-Hellman key exchange. In: 2017 5th International Conference on Electrical Engineering-Boumerdes (ICEE-B), pp. 1–6. IEEE (2017)Google Scholar
13. 13.
Gowda, S.N.: An advanced Diffie-Hellman approach to image steganography. In: 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1–4. IEEE (2016)Google Scholar
14. 14.
Aieh, A., Sen, A., Dash, S.R., Dehuri, S.: Deoxyribonucleic acid (DNA) for a shared secret key cryptosystem with Diffie Hellman key sharing technique. In: Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT), pp. 1–6. IEEE (2015)Google Scholar
15. 15.
Joshi, P., Verma, M., Verma, P.R.: Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN. In: 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), pp. 527–532. IEEE (2015)Google Scholar
16. 16.
Harn, L., Mehta, M., Hsin, W.-J.: Integrating Diffie-Hellman key exchange into the digital signature algorithm (DSA). IEEE Commun. Lett. 8(3), 198–200 (2004)
17. 17.
Mahajan, S., Singh, M.: Analysis of RSA algorithm using GPU programming. arXiv preprint arXiv:1407.1465 (2014)