Abstract
In this report, we demonstrate the pros and cons of Diffie–Hellman key exchange algorithm that is commonly used for the exchange of keys in private-key cryptosystem. A very frequently occurring problem of Diffie–Hellman key exchange algorithm during transmission of the keys through some channel is the Man-In-The-Middle Attack. Security of the message gets affected due to this attack because the attacker who is in the middle of the sender and receiver of the message tampers the message and modifies it according to his/her need. There are some well-known solutions available for the prevention of this attack. Our aim is to review those available techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Khader, A.S., Lai, D.: Preventing man-in-the-middle-attack in Diffie-Hellman Key Exchange Protocol. ICT (2015)
Preneel, B., Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Students and Practitioners. Springer, London (2009)
Ahmed, M., Sanjabi, B., Aldiaz, D., Rezaei, A., Omotunde, H.: Diffie-Hellman and its application in security protocols. Int. J. Eng. Sci. Innovative Technol. (IJESIT) 1, 69–73 (2012)
Gadhavi, L., Bhavsar, M., Bhatnagar, M., Vasoya, S.: Design of Efficient Algorithm for Secured Key Exchange Over Cloud Computing, pp. 180–187 (2016)
Wei, S.: On generalization of Geffe’s generator. IJCSNS 6, 161–165 (2006)
Hosseini, S.M., Karimi, H., Jahan, M.V.: Generating pseudorandom numbers by combining two systems with complex behaviours. J. Inf. Secur. Appl. 149–62 (2014)
Cristian, T.: Security issues of the digital certificates within public key infrastructures. Informatica Economica 13, 16–28 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mitra, S., Das, S., Kule, M. (2021). Prevention of the Man-in-the-Middle Attack on Diffie–Hellman Key Exchange Algorithm: A Review. In: Bhattacharjee, D., Kole, D.K., Dey, N., Basu, S., Plewczynski, D. (eds) Proceedings of International Conference on Frontiers in Computing and Systems. Advances in Intelligent Systems and Computing, vol 1255. Springer, Singapore. https://doi.org/10.1007/978-981-15-7834-2_58
Download citation
DOI: https://doi.org/10.1007/978-981-15-7834-2_58
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7833-5
Online ISBN: 978-981-15-7834-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)