Advertisement

Symmetric Key Generation and Distribution Using Diffie-Hellman Algorithm

  • Kaustubh PurohitEmail author
  • Avanish Kumar
  • Mayank Upadhyay
  • Krishan Kumar
Conference paper
  • 21 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1154)

Abstract

Transfer of data over a network is one of the most endangered things to look for. As the cases of data leaks and theft are increasing exponentially, there is a need of a secure gateway that can prevent the data from getting misused. In group-oriented application such as video conferencing and multi-player gaming, it is necessary that only the trusted member can access the data and that too in a confidential manner in such a way that the prowler is not able to modify or ingress it. The Diffie–Hellman algorithm was one of the first and foremost schemes used for key exchange using a symmetric key encryption technique. The proposed algorithm is an advanced version of the traditional Diffie–Hellman algorithm that can be used efficiently by increasing the time complexity of the current by a fair margin thus making it difficult for the intruder to decrypt the common key.

Keywords

Diffie–Hellman Key sharing Symmetric key Public key cryptography 

References

  1. 1.
    May, P., Ehrlich, H.C., Steinke, T.: ZIB structure prediction pipeline: composing a complex biological workflow through web services. In: Nagel, W.E., Walter, W.V., Lehner, W. (eds.) Euro-Par 2006. LNCS, vol. 4128, pp. 1148–1158. Springer, Heidelberg (2006)Google Scholar
  2. 2.
    Tahir, R., Hu, H., Gu, D., McDonald-Maier, K., Howells, G: A scheme for the generation of strong ICMetrics based session key pairs for secure embedded system applications. In: 2013 27th International Conference on Advanced Information Networking and Applications Workshops (2013)Google Scholar
  3. 3.
    Taparia, A., Panigrahy, S.K., Jena, S.K.: Secure key exchange using enhanced Diffie-Hellman protocol based on string comparison. In: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) (2017)Google Scholar
  4. 4.
    Arora, S.,Hussain, M.: Secure session key sharing using symmetric key cryptography. In: 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (2018)Google Scholar
  5. 5.
    Agarwal, A., Kumar, A.: Encoded IDs symmetric session key exchange. In: 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC) (2017)Google Scholar
  6. 6.
    Deshpande, P., Santhanalakshmi, S., Lakshmi, P., Vishwa, A.: Experimental study of Diffie-Hellman key exchange algorithm on embedded devices. In: 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS) (2017)Google Scholar
  7. 7.
    Kumari, S., Chaudhary, P., Chen, C.-M., Khan, M.K.: Questioning key compromise attack on Ostad-Sharif et al.’s authentication and session key generation scheme for healthcare applications 7 (2019) (IEEE Access)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Kaustubh Purohit
    • 1
    Email author
  • Avanish Kumar
    • 1
  • Mayank Upadhyay
    • 1
  • Krishan Kumar
    • 1
  1. 1.Department of Computer Science and EngineeringNational Institute of Technology UttarakhandSrinagar GarhwalIndia

Personalised recommendations