-In the well-known "prisoners' problem", a representative example of steganography, two persons attempt to communicate covertly without alerting the warden. One approach to achieve this task is to embed the message in an innocent-looking cover-media. In our model, the message contents are scattered in the cover in a certain way that is based on a secret key known only to the sender and receiver. Therefore, even if the warden discovers the existence of the message, he will not be able to recover it. In other words a covert or subliminal communication channel is opened between two persons who possess a secret key to reassemble its contents. In this article, we propose a video or audio steganographic model in which the hidden message can be composed and inserted in the cover in real-time. This is realized by designing and implementing a secret key steganographic micro-architecture employing Field Programmable Gate Arrays FPGA.
Diffie-Hellman key agreement protocol is the first and most famous protocol, but it has many flaws and drawbacks. Therefore, this paper proposes a new two-pass authenticated key agreement protocol (AK) and extent its capabilities to support key confirmation as a three-pass authenticated key agreement with key confirmation protocol (AKC). The present protocols are based on Diffie-Heliman problem and it is worldng over elliptic curve group in the setting of asymmetric techniques.
I INTRODUCTIONKey agreement refers to one form of key establishment protocols in which two or more users execute a protocol to securely share a session key. The most famous protocol for key agreement was proposed by Diffie and Hellman which is based on concept of public-key cryptography [1]. There are two versions ofthe Diffie-Hellman protocol namely static and ephemeral. In the first one, the entities exchange static public keys, and in the second, the entities exchange ephemeral public keys. Therefore, the static protocol has a major drawback, is that the entities S and B compute the same session key for each run of the protocol. Also the ephemeral Diffie-Hellman protocol is vulnerable to a man-in-the-middle attack.In order to counter these weaknesses, a new authenticated key agreement protocol is introduced in this paper. The important feature of the proposed protocol is the established session key is formed as combination of static and ephemeral private keys of two entities A and B. The discussion shows the present protocol meets all security and efficiency attributes.
II DESIRABLE SECURITY AND EFFICIENCY AITRIBUTES OF AK AND AKC PROTOCLSDesirable security attributes of AK and AKC protocols are as follows [2, 3, 5].
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.