Skip to main content

A New Key Agreement Method for Symmetric Encryption Using Elliptic Curves

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 50))

Abstract

The Elliptic Curve Diffie-Hellman (ECDH) is the basic protocol used for key agreement on Elliptic Curves (EC) and it is analogue to the standard Diffie-Hellman key exchange. The security of ECDH relies on the difficulty of the Elliptic Curve Discrete Logarithm Problem (ECDLP), however this protocol is vulnerable to man in the middle attack. In this paper, we first analyze the Ahirwal and Ahke encryption scheme which is based on ECDH key exchange and then we propose a new key agreement method to secure it from man in the middle attack.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)

    Article  MathSciNet  Google Scholar 

  2. Miller, V.S.: Uses of elliptic curves in cryptography. In: Advances in Cryptology, CRYPTO 1985. Lecture Notes in Computer Science, vol. 218, pp. 417–428. Springer (1986). 5. N

    Google Scholar 

  3. Trappe, W., Washington, L.C.: Introduction to Cryptography with Coding Theory, 2nd edn. Pearson-Prentice-Hall, Upper Saddle River (2006)

    MATH  Google Scholar 

  4. Haichour, A.S., Hamadouche, M., Khouas, A.: Hardware design and implementation of ElGamal elliptic curve cryptosystem. Wulfenia J. 23(2), 62–85 (2016)

    Google Scholar 

  5. Chande, M.K., Lee, C.C.: An improvement of a elliptic curve digital signature algorithm. Int. J. Int. Technol. Secur. Trans. 6(3), 219–230 (2016)

    Article  Google Scholar 

  6. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory IT-22, 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  7. Ahirwal, R.R., Ahke, M.: Elliptic curve Diffie-Hellman key exchange algorithm for securing hypertext information on wide area network. Int. J. Comput. Sci. Inf. Technol. 4(2), 363–368 (2013)

    Google Scholar 

  8. Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory, IT-31(4) (1985)

    Google Scholar 

  9. Biswas, G.P.: Establishment of authenticated secret session keys using digital signature standard. Inf. Secur. J. Glob. Perspect. 20(1), 9–16 (2011)

    Article  Google Scholar 

  10. Stallings, W.: Digital signature algorithms. Cryptologia 37, 311–327 (2013)

    Article  Google Scholar 

  11. Vasudeva Reddy, P., Padmavathamma, M.: An authenticated key exchange protocol in elliptic curve cryptography. J. Discrete Math. Sci. Crypt. 10(5), 697–705 (2007)

    MathSciNet  MATH  Google Scholar 

  12. Suneetha, C., Kumar, D.S., Chandrasekhar, A.: Secure key transport in symmetric cryptographic protocols using some elliptic curves over finite fields. Int. J. Comput. Appl. 36(1) (2011)

    Google Scholar 

  13. Kumar, D.S., Suneetha, C.H., Chandrasekhar, A.: Authentic key transport in symmetric cryptographic protocols using some elliptic curves over finite fields. Int. J. Math. Arch. 3(1), 137–142 (2012)

    Google Scholar 

  14. Mehibel, N., Hamadouche, M.: A new approach of elliptic curve Diffie-Hellman key exchange. In: The 5th International Conference on Electrical Engineering, Boumerdes, Algeria, 29–31 October 2017 (2017)

    Google Scholar 

  15. Mehibel, N., Hamadouche, M.: A public key data encryption based on elliptic curves. Int. J. Math. Comput. Methods 2, 393–401 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nissa Mehibel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mehibel, N., Hamadouche, M., Haichour, A.S. (2019). A New Key Agreement Method for Symmetric Encryption Using Elliptic Curves. In: Demigha, O., Djamaa, B., Amamra, A. (eds) Advances in Computing Systems and Applications. CSA 2018. Lecture Notes in Networks and Systems, vol 50. Springer, Cham. https://doi.org/10.1007/978-3-319-98352-3_9

Download citation

Publish with us

Policies and ethics