Abstract
Numerous approaches to establish secure communication have emerged with the advancement of modern technology to ensure the shared secret are protected from attackers. Protocols for authenticated key exchange serve a significant role in communication security and are widely used in a variety of real-world network applications. Recent study suggests using modular multiplication instead of exponentiation operation in Diffie-Hellman Key Exchange to securely generating the common session key. However, the processes are not properly discussed. Therefore, the process of applying the Left-to-Right Binary method to compute modular exponentiation that are frequently used in Diffie-Hellman Key Exchange protocol are briefly discussed. Further, our key objective is to develop a mathematical equation using a combination of modular exponentiation and modular multiplication that satisfies the condition of Diffie-Hellman Key Exchange protocol with eight parties. Therefore, in this study we used Left to Right Binary method to compute the common session key, k in Case 1 and each of the participants’ private key in Case 2. As a result, we managed to modify the mathematical equation using a combination of modular exponentiation and modular multiplication, hence making it difficult for an attacker to break into the system since the intruder or any attacker needs to find eight different private keys. In the further, this study can be extended by increasing the number of parties involved which will make any users communicate with each other. Besides that, this study should be repeated using a bigger value for both private key and prime number. Other than that, upcoming research can modify the mathematical equation in either case 1 or case 2 to make sure that the value of the common key is equal. Reason for this is that the LRB method can be applied everywhere in Diffie-Hellman Key Exchange that offers more flexibility if the common key is equal for both cases. Lastly, this study uses numerical example for proving, hence further work may prove the proposed method by computation time for efficiency.
Metadata
Item Type: | Student Project |
---|---|
Creators: | Creators Email / ID Num. Azman, Nurin Aisyah UNSPECIFIED Aziz, Nurul Hazirah UNSPECIFIED Wan Muhammad Sukri, Wan Nur Akliema UNSPECIFIED |
Subjects: | H Social Sciences > HA Statistics > Statistical data H Social Sciences > HA Statistics > Theory and method of social science statistics |
Divisions: | Universiti Teknologi MARA, Negeri Sembilan > Seremban Campus > Faculty of Computer and Mathematical Sciences |
Programme: | Bachelor of Science (Hons.) (Computational Mathematics) |
Keywords: | Numerous, Diffie-Hellman Key Exchange, Diffie-Hellman Key Exchange, LRB method |
Date: | 2022 |
URI: | https://ir.uitm.edu.my/id/eprint/80631 |
Download
80631.pdf
Download (216kB)