Skip to main content

A Stealth Key Exchange Protocol

  • Conference paper
  • First Online:
Intelligent Computing (CompCom 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 998))

Included in the following conference series:

Abstract

Cryptography, the science of secret writing, is in use since long to inarticulate the legitimate contents to prevent their unauthorized exposure. To ensure secure communication between communicators, cryptographic contrivances such as encryption and authentication relies on the conjecture of prior sharing of some secret called cryptographic or secret key that reign the security of the underneath algorithms. Hence, safekeeping and handling of such keys at all stages of encryption and decryption inclusive of its generation, storage, distribution, archiving and destruction are imperative. Kirchhoff, in 1883, has already elucidated on the significance of such keys by expounding that the security of a public domain encryption algorithm lies in protecting the key used in communication. Regardless of the key being symmetric or asymmetric, its distribution/exchange over an insecure channel such as the internet, together with the increasing concern among technologically advanced countries on suppressing encryption, calls for an oblivious mechanism for its undercover traversal. Steganography, the purpose of which is to embed information seamlessly inside some carrier, is the technique used for stealth information exchange, and hence, seems ideal for key management and its successive dissemination. Through this research endeavor, we have proposed a novel stealth key-exchange solution, which makes use of interactive computer-mediated technologies, cryptography, and steganography. Our proposed method adlibs the Diffie-Hellman key exchange algorithm by disregarding the direct routing of any data relating to key exchange, and hence protects it from man-in-the-middle attack by keeping intact the anonymity of communicators.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mohammadi, M: The Internet and the treasure house of information. In: The Iranian Reform Movement, pp. 215–239 (2019). Springer

    Google Scholar 

  2. Papacharissi, Z.: The virtual sphere: the internet as a public sphere. In: Praktiken der Überwachten, pp. 43–60. Springer, Wiesbaden (2019)

    Google Scholar 

  3. Aswale, P., Shukla, A., Bharati, P., Bharambe, S., Palve, S.: An overview of internet of things: architecture, protocols and challenges. In: Information and Communication Technology for Intelligent Systems, pp. 299–308. Springer, Singapore (2019)

    Google Scholar 

  4. Chang, C., Srirama, S.N., Buyya, R.: Internet of Things (IoT) and new computing paradigms. In: Buyya, R., Srirama, S.N., (eds.) Fog and Edge Computing: Principles and Paradigms, 1st edn. Wiley (2019)

    Google Scholar 

  5. Benjelloun, F.-Z., Lahcen, A.A.: Big data security: challenges, recommendations and solutions. In: Web Services: Concepts, Methodologies, Tools, and Applications, pp. 25–38. IGI Global (2019)

    Google Scholar 

  6. Ali, I., Sabir, S., Ullah, Z.: Internet of things security, device authentication and access control: a review. arXiv preprint arXiv:1901.07309 (2019)

  7. Sciancalepore, S., Oligeri, G., Piro, G., Boggia, G., Di Pietro, R.: Exchange: securing IoT via channel anonymity. Comput. Commun. 134, 14–29 (2019)

    Article  Google Scholar 

  8. Yahya, A.: Steganography techniques. In: Steganography Techniques for Digital Images, pp. 9–42. Springer (2019)

    Google Scholar 

  9. Horsman, G.: A call for the prohibition of encryption; panacea or problem? IEEE Security and Privacy Magazine (2018)

    Google Scholar 

  10. Kuehn, K.: Surveillance and South Africa. The Polit. Econ. Commun. 6(2), 94–100 (2019)

    Google Scholar 

  11. Kapoor, N., Narkowicz, K.: Unmaking citizens: passport removals, pre-emptive policing and the reimagining of colonial governmentalities. Ethn. and Racial Stud. 42, 45–62 (2019)

    Article  Google Scholar 

  12. Bachmann, G., Knecht, M., Wittel, A.: The social productivity of anonymity. Ephemera Theor. Polit. Organ. 17, 241–258 (2017)

    Google Scholar 

  13. Lipschultz, J.: Free Expression in the Age of the Internet: Social and Legal Boundaries. Routledge, New York (2018)

    Chapter  Google Scholar 

  14. Draper, N.A.: The Identity Trade: Selling Privacy and Reputation Online. New York University Press, New York (2019)

    Google Scholar 

  15. Chang, C.P.: Searching on Facebook through the lens of the concept of privacy. In: Social Networks and Surveillance for Society, pp. 129–148. Springer, Cham (2019)

    Google Scholar 

  16. Mishra, S., Sahoo, S., Mishra, B.K.: Addressing security issues and standards in Internet of things. In: Emerging Trends and Applications in Cognitive Computing, pp. 224–257. IGI Global (2019)

    Google Scholar 

  17. Attié, E., Meyer-Waarden, L.: The acceptance process of the Internet of Things: how to improve the acceptance of the IoT technology. In: Smart Marketing with the Internet of Things, pp. 21–45. IGI Global (2019)

    Google Scholar 

  18. Lin, T.T.C., Kononova, A., Chiang, Y.-H.: Screen addiction and media multitasking among American and Taiwanese users. J. Comput. Inf. Syst., (2019). https://doi.org/10.1080/08874417.2018.1556133

  19. Przegalinska, A.: Addiction and distraction. In Wearable Technologies in Organizations, pp. 25–31. Springer, Cham (2019)

    Google Scholar 

  20. Hedström, K., Sefyrin, J., Gustafsson, M., Wihlborg, E., Iréne, B.: A digital society for all? Meanings, practices and policies for digital diversity. In: Proceedings of the 52nd Hawaii International Conference on System Sciences (2019)

    Google Scholar 

  21. Kizza, J.M.: Ethical, privacy, and security issues in the online social network ecosystems. In: Ethical and Secure Computing. Undergraduate Topics in Computer Science, Springer, Cham (2019)

    Google Scholar 

  22. Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., et al.: RFC 2616. Hypertext Transfer Protocol–HTTP/1.1, vol. 2, p. 2.2 (1999)

    Google Scholar 

  23. Andersson, L., Madsen, T.: RFC 4026-Provider Provisioned Virtual Private Network (VPN) Terminology, March 2005

    Google Scholar 

  24. Appelbaum, J., Muffett, A.: The “. onion” special-use domain name (2015)

    Google Scholar 

  25. Pinsonneault, A., Heppel, N.: Anonymity in group support systems research: a new conceptualization, measure, and contingency framework. J. Manag. Inf. Syst. 14, 89–108 (1997)

    Article  Google Scholar 

  26. Wang, D., Cheng, H., He, D., Wang, P.: On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Syst. J. 12, 916–925 (2018)

    Article  Google Scholar 

  27. Wood, A., Nissim, K.: Is privacy privacy? (2018)

    Google Scholar 

  28. Rumbold, B., Wilson, J.: Privacy rights and public information. J. Polit. Philos. 27, 3–25 (2019)

    Article  Google Scholar 

  29. Cole, D., Fabbrini, F.: Bridging the transatlantic divide? The United States, the European Union, and the protection of privacy across borders. Int. J. Const. Law 14, 220–237 (2016)

    Google Scholar 

  30. Hamidi, F., Poneres, K., Massey, A., Hurst, A.: Who should have access to my pointing data?: privacy tradeoffs of adaptive assistive technologies. In: Proceedings of the 20th International ACM SIGACCESS Conference on Computers and Accessibility, pp. 203–216 (2018)

    Google Scholar 

  31. Forgas, J.P., Baumeister Routledge, R.F.: The Social Psychology of Living Well, 1st edn. Published February 7 (2018). ISBN 9780815369240

    Google Scholar 

  32. Roth, G.B.: Probabilistic key rotation. Google Patents (2019)

    Google Scholar 

  33. Thapar, S.S., Sarangal, H.: A study of data threats and the role of cryptography algorithms. In: 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 819–824 (2018)

    Google Scholar 

  34. Yan, S.Y.: Offensive cryptography. In: Cybercryptography: Applicable Cryptography for Cyberspace Security. Springer, Cham (2019)

    Google Scholar 

  35. Pelton, J.N., Singh, I.B.: Protecting privacy from internet abuses in the smart city. In: Smart Cities of Today and Tomorrow. Copernicus, Cham (2019)

    Google Scholar 

  36. Cavelty, M.D., Kavanagh, C.: Cybersecurity and human rights. In: Research Handbook on Human Rights and Digital Technology. Edward Elgar Publishing (2019)

    Google Scholar 

  37. Geurden, M.: A New Future for Military Security Using Fully Homomorphic Encryption (2018)

    Google Scholar 

  38. Dierks, T., Rescorla, E.: RFC 5246. The transport layer security (TLS) protocol version, vol. 1 (2008)

    Google Scholar 

  39. Hoffman, P.: Cryptographic suites for IPsec, 2070–1721 (2005)

    Google Scholar 

  40. Ghosh, E., Debnath, D., Banik, B.G.: Blind RGB image Steganography using discrete cosine transformation. In: Emerging Technologies in Data Mining and Information Security, pp. 189–201. Springer, Singapore (2019)

    Google Scholar 

  41. Douglas, M., Bailey, K., Leeney, M., Curran, K.: An overview of steganography techniques applied to the protection of biometric data. Multimedia Tools and Appl. 77, 17333–17373 (2018)

    Article  Google Scholar 

  42. Sarmah, D.K., Kulkarni, A.J.: Improved cohort Intelligence—a high capacity, swift and secure approach on JPEG image steganography. J. Inf. Secu. Appl. 45, 90–106 (2019)

    Google Scholar 

  43. Kothari, A.M., Dwivedi, V., Thanki, R.M.: Introduction. In: Watermarking Techniques for Copyright Protection of Videos. Signals and Communication Technology. Springer, Cham (2019)

    Book  Google Scholar 

  44. Kini, N.G., Kini, V.G.: A secured steganography algorithm for hiding an image in an image. In: Integrated Intelligent Computing, Communication and Security, pp. 539–546. Springer (2019)

    Google Scholar 

  45. Pandian, R., Xu, F., Sadrloshrafi, M., Gupta, R.: Online data transformation. Google Patents (2018)

    Google Scholar 

  46. Shashni, N., Yadav, M.: Cryptanalysis on digital image watermarking based on feature extraction and visual cryptography. In: Progress in Advanced Computing and Intelligent Engineering, pp. 425–435. Springer, Singapore (2019)

    Google Scholar 

  47. Bhat, S., Kapoor, V.: Secure and efficient data privacy, authentication and integrity schemes using hybrid cryptography. In: International Conference on Advanced Computing Networking and Informatics, pp. 279–285 (2019)

    Google Scholar 

  48. Hancock, P., Steele, S.: Facilitating provisioning of an out-of-band pseudonym over a secure communication channel. Google Patents (2019)

    Google Scholar 

  49. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  50. Housley, R.: Internationalization Updates to RFC 5280, 2070–1721 (2018)

    Google Scholar 

  51. Harkins, D., Carrel, D.: RFC 2409. The Internet Key Exchange (IKE) (1998)

    Google Scholar 

  52. Felsch, D., Grothe, M., Schwenk, J., Czubak, A., Szymanek, M.: The dangers of key reuse: practical attacks on IPsec {IKE}. In: 27th {USENIX} Security Symposium ({USENIX} Security 18), pp. 567–583 (2018)

    Google Scholar 

  53. Farrell, S., Tschofenig, H.: Pervasive monitoring is an attack (2014)

    Google Scholar 

  54. Deibert, R.: Cyberspace under siege. J. Democracy 26, 64–78 (2015)

    Article  Google Scholar 

  55. Cooper, A., Tschofenig, H., Aboba, B., Peterson, J., Morris, J., Hansen, M. et al.: RFC 6973: Privacy considerations for Internet protocols. IETF. Retrieved from tools. ietf. org/html/rfc6973 (2013)

    Google Scholar 

  56. Rescorla, E., Korver, B.: RFC 3552: Guidelines for writing RFC text on security considerations. Internet Society Req. for Comm. (2003)

    Google Scholar 

  57. Simmons, G.J.: The prisoners’ problem and the subliminal channel. In: Advances in Cryptology, pp. 51–67 (1984)

    Chapter  Google Scholar 

  58. Von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using hard AI problems for security. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 294–311 (2003)

    Google Scholar 

  59. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  60. Turner, S.: Using SHA2 Algorithms with Cryptographic Message Syntax (2010)

    Google Scholar 

  61. Daemen, J., Rijmen, V.: AES proposal: Rijndael (1999)

    Google Scholar 

  62. Choi, J., Oh, T., Aiken, W., Woo, S.S., Kim, H.: POSTER: I can’t hear this because I am human: a novel design of audio CAPTCHA system. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 833–835 (2018)

    Google Scholar 

  63. Chong, I., Xiong, A., Proctor, R.W.: Human factors in the privacy and security of the Internet of things. In: Ergonomics in Design (2018). https://doi.org/10.1177/1064804617750321

    Article  Google Scholar 

  64. Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security. BT Technol. J. 19, 122–131 (2001)

    Article  Google Scholar 

  65. Andress, A.: Surviving Security: How to Integrate People, Process, and Technology. Auerbach Publications, Boca Raton, 2003

    Chapter  Google Scholar 

  66. Brauch, H.G.: From a security towards a survival dilemma. In: Globalization and environmental challenges, pp. 537–552. Springer, Berlin (2008)

    Google Scholar 

  67. Nye Jr., J.S., Lynn-Jones, S.M.: International security studies: a report of a conference on the state of the field. Int. Secur. 12, 5–27 (1988)

    Article  Google Scholar 

  68. Perrin, C.: The CIA triad. Dostopno na (2008). http://www.techrepublic.com/blog/security/the-cia-triad/488

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khan Farhan Rafat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rafat, K.F. (2019). A Stealth Key Exchange Protocol. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Intelligent Computing. CompCom 2019. Advances in Intelligent Systems and Computing, vol 998. Springer, Cham. https://doi.org/10.1007/978-3-030-22868-2_48

Download citation

Publish with us

Policies and ethics