Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol

Kara, Mostefa and Laouid, Abdelkader and AlShaikh, Muath and Bounceur, Ahcène and Hammoudeh, Mohammad (2021) Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol. Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, 7 (3). pp. 380-387.

[img] Text
2 Secure Key Exchange Against Man-in-the-Middle Attack Modified Diffie-Hellman Protocol.pdf

Download (766kB)


One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a widely used technique on which key exchange systems around the world depend. This protocol is simple and uncomplicated, and its robustness is based on the Discrete Logarithm Problem (DLP). Despite this, he is considered weak against the man-in-the-middle attack. This article presents a completely different version of the DHP protocol. The proposed version is based on two verification stages. In the first step, we check if the pseudo-random value α that Alice sends to Bob has been manipulated! In the second step, we make sure that the random value β that Bob sends to Alice is not manipulated. The man-in-the-middle attacker, Eve, can impersonate neither Alice nor Bob, manipulate their exchanged values, or discover the secret encryption key.

Item Type: Artikel Umum
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisi / Prodi: Faculty of Industrial Technology (Fakultas Teknologi Industri) > S1-Electrical Engineering (S1-Teknik Elektro)
Depositing User: M.Eng. Alfian Ma'arif
Date Deposited: 20 Jan 2022 04:22
Last Modified: 20 Jan 2022 04:22

Actions (login required)

View Item View Item