Abstract
The Elliptic Curve Diffie-Hellman (ECDH) is the basic protocol used for key agreement on Elliptic Curves (EC) and it is analogue to the standard Diffie-Hellman key exchange. The security of ECDH relies on the difficulty of the Elliptic Curve Discrete Logarithm Problem (ECDLP), however this protocol is vulnerable to man in the middle attack. In this paper, we first analyze the Ahirwal and Ahke encryption scheme which is based on ECDH key exchange and then we propose a new key agreement method to secure it from man in the middle attack.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)
Miller, V.S.: Uses of elliptic curves in cryptography. In: Advances in Cryptology, CRYPTO 1985. Lecture Notes in Computer Science, vol. 218, pp. 417–428. Springer (1986). 5. N
Trappe, W., Washington, L.C.: Introduction to Cryptography with Coding Theory, 2nd edn. Pearson-Prentice-Hall, Upper Saddle River (2006)
Haichour, A.S., Hamadouche, M., Khouas, A.: Hardware design and implementation of ElGamal elliptic curve cryptosystem. Wulfenia J. 23(2), 62–85 (2016)
Chande, M.K., Lee, C.C.: An improvement of a elliptic curve digital signature algorithm. Int. J. Int. Technol. Secur. Trans. 6(3), 219–230 (2016)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory IT-22, 644–654 (1976)
Ahirwal, R.R., Ahke, M.: Elliptic curve Diffie-Hellman key exchange algorithm for securing hypertext information on wide area network. Int. J. Comput. Sci. Inf. Technol. 4(2), 363–368 (2013)
Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory, IT-31(4) (1985)
Biswas, G.P.: Establishment of authenticated secret session keys using digital signature standard. Inf. Secur. J. Glob. Perspect. 20(1), 9–16 (2011)
Stallings, W.: Digital signature algorithms. Cryptologia 37, 311–327 (2013)
Vasudeva Reddy, P., Padmavathamma, M.: An authenticated key exchange protocol in elliptic curve cryptography. J. Discrete Math. Sci. Crypt. 10(5), 697–705 (2007)
Suneetha, C., Kumar, D.S., Chandrasekhar, A.: Secure key transport in symmetric cryptographic protocols using some elliptic curves over finite fields. Int. J. Comput. Appl. 36(1) (2011)
Kumar, D.S., Suneetha, C.H., Chandrasekhar, A.: Authentic key transport in symmetric cryptographic protocols using some elliptic curves over finite fields. Int. J. Math. Arch. 3(1), 137–142 (2012)
Mehibel, N., Hamadouche, M.: A new approach of elliptic curve Diffie-Hellman key exchange. In: The 5th International Conference on Electrical Engineering, Boumerdes, Algeria, 29–31 October 2017 (2017)
Mehibel, N., Hamadouche, M.: A public key data encryption based on elliptic curves. Int. J. Math. Comput. Methods 2, 393–401 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Mehibel, N., Hamadouche, M., Haichour, A.S. (2019). A New Key Agreement Method for Symmetric Encryption Using Elliptic Curves. In: Demigha, O., Djamaa, B., Amamra, A. (eds) Advances in Computing Systems and Applications. CSA 2018. Lecture Notes in Networks and Systems, vol 50. Springer, Cham. https://doi.org/10.1007/978-3-319-98352-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-98352-3_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98351-6
Online ISBN: 978-3-319-98352-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)