Symmetric Key Generation and Distribution Using Diffie-Hellman Algorithm

  • Kaustubh PurohitEmail author
  • Avanish Kumar
  • Mayank Upadhyay
  • Krishan Kumar
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1154)


Transfer of data over a network is one of the most endangered things to look for. As the cases of data leaks and theft are increasing exponentially, there is a need of a secure gateway that can prevent the data from getting misused. In group-oriented application such as video conferencing and multi-player gaming, it is necessary that only the trusted member can access the data and that too in a confidential manner in such a way that the prowler is not able to modify or ingress it. The Diffie–Hellman algorithm was one of the first and foremost schemes used for key exchange using a symmetric key encryption technique. The proposed algorithm is an advanced version of the traditional Diffie–Hellman algorithm that can be used efficiently by increasing the time complexity of the current by a fair margin thus making it difficult for the intruder to decrypt the common key.


Diffie–Hellman Key sharing Symmetric key Public key cryptography 


  1. 1.
    May, P., Ehrlich, H.C., Steinke, T.: ZIB structure prediction pipeline: composing a complex biological workflow through web services. In: Nagel, W.E., Walter, W.V., Lehner, W. (eds.) Euro-Par 2006. LNCS, vol. 4128, pp. 1148–1158. Springer, Heidelberg (2006)Google Scholar
  2. 2.
    Tahir, R., Hu, H., Gu, D., McDonald-Maier, K., Howells, G: A scheme for the generation of strong ICMetrics based session key pairs for secure embedded system applications. In: 2013 27th International Conference on Advanced Information Networking and Applications Workshops (2013)Google Scholar
  3. 3.
    Taparia, A., Panigrahy, S.K., Jena, S.K.: Secure key exchange using enhanced Diffie-Hellman protocol based on string comparison. In: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (2017)Google Scholar
  4. 4.
    Arora, S.,Hussain, M.: Secure session key sharing using symmetric key cryptography. In: 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (2018)Google Scholar
  5. 5.
    Agarwal, A., Kumar, A.: Encoded IDs symmetric session key exchange. In: 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC) (2017)Google Scholar
  6. 6.
    Deshpande, P., Santhanalakshmi, S., Lakshmi, P., Vishwa, A.: Experimental study of Diffie-Hellman key exchange algorithm on embedded devices. In: 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS) (2017)Google Scholar
  7. 7.
    Kumari, S., Chaudhary, P., Chen, C.-M., Khan, M.K.: Questioning key compromise attack on Ostad-Sharif et al.’s authentication and session key generation scheme for healthcare applications 7 (2019) (IEEE Access)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Kaustubh Purohit
    • 1
    Email author
  • Avanish Kumar
    • 1
  • Mayank Upadhyay
    • 1
  • Krishan Kumar
    • 1
  1. 1.Department of Computer Science and EngineeringNational Institute of Technology UttarakhandSrinagar GarhwalIndia

Personalised recommendations