2022
DOI: 10.1088/1742-6596/2161/1/012014
|View full text |Cite
|
Sign up to set email alerts
|

Enhancement of Security of Diffie-Hellman Key Exchange Protocol using RSA Cryptography.

Abstract: Cryptography is related and referred to as the secured transmission of messages amongst the sender and the intended receiver by ensuring confidentiality, integrity, and authentication. Diffie – Hellman (DH) key exchange protocol is a well-known algorithm that would generate a shared secret key among the sender and the intended receiver, and the basis of cryptosystems for using public and private key for encryption and decryption process. But it is severely affected by the Man in the Middle (MITM) attack that w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 29 publications
0
9
0
Order By: Relevance
“…Gupta, Chiradeep, and NV Subba Reddy [15], They propose a strategy for fusing the -DH key exchange protocol and the public-key RSA encryption system‖ to defend against the MITM attack. In order to assess the efficacy of their suggested strategy, the researchers contrast its performance with that of the original DH Key Exchange technique and the RSA Cryptosystem.…”
Section: Literature Review On Modified Rsa Approachmentioning
confidence: 99%
“…Gupta, Chiradeep, and NV Subba Reddy [15], They propose a strategy for fusing the -DH key exchange protocol and the public-key RSA encryption system‖ to defend against the MITM attack. In order to assess the efficacy of their suggested strategy, the researchers contrast its performance with that of the original DH Key Exchange technique and the RSA Cryptosystem.…”
Section: Literature Review On Modified Rsa Approachmentioning
confidence: 99%
“…Many techniques for improving and altering security algorithms to estimate better security in the shortest time have been given in the literature [11][12][13][14][15][16][17][18][19][20][21][22][23]. In [11], a model combining the public Key RSA cryptography system with the Di e-Hellman (DH) key exchange is created to prevent the man-in-themiddle (MITM) attack. Performance was compared to the DH key exchange algorithm and the RSA cryptosystem to determine the effectiveness of the model.…”
Section: Related Workmentioning
confidence: 99%
“…One of those safety mechanisms is cryptography. Cryptography plays a vital role in the security of information [5]. Cryptography is a Greek word that means "study of hidden secrets".…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Those keys, which are pre-shared by two remote parties, have to be generated and distributed securely. Classically, this secure key genera-tion/distribution process is achieved by public-key systems such as the Diffie-Hellman key exchange (DH) [4] and Rivest-Shamir-Adleman (RSA) [5]. However, the security of DH, RSA, and other public-key systems is heavily based on the computational difficulty of certain mathematical problems such as discrete logarithm and factoring problems [6], [7].…”
Section: Introductionmentioning
confidence: 99%