Advertisement

A Novel Key Exchange Protocol Provably Secure Against Man-in-the-Middle Attack

  • Abhijit Chowdhury
  • Shubhajit Nath
  • Jaydeep Howlader
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 284)

Abstract

Diffie-Hellman (D-H) key exchange protocol, first published in 1976 is one of the most distinguished and widely used secured key exchange protocols. The protocol makes it possible to exchange a symmetric key between two parties over an unsecured communication channel without pre-agreement of any shared secret. The D-H key exchange protocol however requires a pre-set public parameters P (a large prime) and g a generator of ℤp to be public i.e. known to all users of the system. This paper proposes a key exchange mechanism without any public parameter. Unlike D-H key exchange mechanism our scheme uses encryption to transmit intermediate data during key exchange stage, thus it is non-vulnerable to man-in-the-middle attach.

References

  1. 1.
    B. Schneier, Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C (Wiley). John Wiley & Sons, (1995)Google Scholar
  2. 2.
    A.J. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography (CRC Press, 1996)Google Scholar
  3. 3.
    R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 6–7 (1978)Google Scholar
  4. 4.
    W. Diffie, M. Hellman, New directions in cryptography. IEEE Trans. Info. Theory 22(6), 34 (1976)Google Scholar
  5. 5.
    C.S. Turner, Euler’s totient function and public key cryptography. http://web.cs.du.edu/~ramki/courses/security/2011Winter/notes/RSAmath.pdf
  6. 6.
    M.O. Rabin, Digitalized signatures and public-key functions as intractable as factorization. MIT/LCS/TR-212, (1979)Google Scholar
  7. 7.
    C. Cocks, A note on non-secret encryption. CESG report, (1973)Google Scholar
  8. 8.
    K. Schmidt-Samoa, A new rabin-type trapdoor permutation equivalent to factoring and its applications, in IACR Cryptology Archive (2005)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Abhijit Chowdhury
    • 1
  • Shubhajit Nath
    • 1
  • Jaydeep Howlader
    • 2
  1. 1.Department of Computer ApplicationsNSHM College of Management and TechnologyDurgapurIndia
  2. 2.Department of Information TechnologyNational Institute of TechnologyDurgapurIndia

Personalised recommendations