[PDF][PDF] Secure key exchange against man-in-the-middle attack: Modified diffie-hellman protocol

M Kara, A Laouid, M AlShaikh… - Jurnal Ilmiah Teknik …, 2021 - researchgate.net
One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a
widely used technique on which key exchange systems around the world depend. This …

[PDF][PDF] A secure wireless communication protocol using Diffie-Hellman key exchange

A Chaturvedi, N Srivastava, V Shukla - International journal of computer …, 2015 - Citeseer
ABSTRACT In 1976, Diffie and Hellman in their path breaking paper [5] proposed a two
party key agreement protocol based on finite field. Diffie–Hellman Key Exchange Protocol …

Improving the Diffie-Hellman secure key exchange

P Bhattacharya, M Debbabi… - … Conference on Wireless …, 2005 - ieeexplore.ieee.org
Diffie-Hellman (DH) is a well-known cryptographic algorithm used for secure key exchange.
The first appearance of DH was in 1976. The algorithm allows two users to exchange a …

[PDF][PDF] Diffie-Hellman key exchange protocol with entities authentication

O Pal, B Alam - International Journal Of Engineering And Computer …, 2017 - meity.gov.in
The Diffie-Hellman key exchange protocol provides the opportunity to arrive at a common
secret key by exchanging texts over insecure medium without meeting in advance. Diffie …

[PDF][PDF] Diffie-Hellman and its application in security protocols

M Ahmed, B Sanjabi, D Aldiaz, A Rezaei… - International Journal …, 2012 - researchgate.net
With the wide use of the Internet, virtually everyone is now connected to each other through
their computers. This has led to a positive impact in the human environment socially …

Enhancement of Security of Diffie-Hellman Key Exchange Protocol using RSA Cryptography.

C Gupta, NVS Reddy - Journal of Physics: Conference Series, 2022 - iopscience.iop.org
Cryptography is related and referred to as the secured transmission of messages amongst
the sender and the intended receiver by ensuring confidentiality, integrity, and …

CE-SKE: cost-effective secure key exchange scheme in Fog Federation

Y Salami, Y Ebazadeh, V Khajehvand - Iran Journal of Computer Science, 2021 - Springer
Security in cyberspace has become an important problem in the modern world. Security
threats are a disadvantage for jobbers on cloud computing, thus using different levels of …

Integrating Diffie-Hellman key exchange into the digital signature algorithm (DSA)

L Harn, M Mehta, WJ Hsin - IEEE communications letters, 2004 - ieeexplore.ieee.org
The National Institute of Standards and Technology (NIST) has published a series of security
standards under Federal Information Processing Standard (FIPS). Standard for key …

Research on Diffie-Hellman key exchange protocol

N Li - 2010 2nd International Conference on Computer …, 2010 - ieeexplore.ieee.org
The purpose of the Diffie-Hellman protocol is to enable two users to exchange a secret key
securely that can then be used for subsequent encryption of messages. The protocol itself is …

[PDF][PDF] Safety measures against man-in-the-middle attack in key exchange

CK Kumar, GJA Jose, C Sajeev… - ARPN Journal of …, 2012 - researchgate.net
Several techniques have been proposed for the distribution of public keys. The ability to
distribute cryptographic keys securely has been a challenge for centuries. The Diffie …