The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri

Azman, Nurin Aisyah and Aziz, Nurul Hazirah and Wan Muhammad Sukri, Wan Nur Akliema (2022) The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri. [Student Project] (Unpublished)

Abstract

Numerous approaches to establish secure communication have emerged with the advancement of modern technology to ensure the shared secret are protected from attackers. Protocols for authenticated key exchange serve a significant role in communication security and are widely used in a variety of real-world network applications. Recent study suggests using modular multiplication instead of exponentiation operation in Diffie-Hellman Key Exchange to securely generating the common session key. However, the processes are not properly discussed. Therefore, the process of applying the Left-to-Right Binary method to compute modular exponentiation that are frequently used in Diffie-Hellman Key Exchange protocol are briefly discussed. Further, our key objective is to develop a mathematical equation using a combination of modular exponentiation and modular multiplication that satisfies the condition of Diffie-Hellman Key Exchange protocol with eight parties. Therefore, in this study we used Left to Right Binary method to compute the common session key, k in Case 1 and each of the participants’ private key in Case 2. As a result, we managed to modify the mathematical equation using a combination of modular exponentiation and modular multiplication, hence making it difficult for an attacker to break into the system since the intruder or any attacker needs to find eight different private keys. In the further, this study can be extended by increasing the number of parties involved which will make any users communicate with each other. Besides that, this study should be repeated using a bigger value for both private key and prime number. Other than that, upcoming research can modify the mathematical equation in either case 1 or case 2 to make sure that the value of the common key is equal. Reason for this is that the LRB method can be applied everywhere in Diffie-Hellman Key Exchange that offers more flexibility if the common key is equal for both cases. Lastly, this study uses numerical example for proving, hence further work may prove the proposed method by computation time for efficiency.

Metadata

Item Type: Student Project
Creators:
Creators
Email / ID Num.
Azman, Nurin Aisyah
UNSPECIFIED
Aziz, Nurul Hazirah
UNSPECIFIED
Wan Muhammad Sukri, Wan Nur Akliema
UNSPECIFIED
Subjects: H Social Sciences > HA Statistics > Statistical data
H Social Sciences > HA Statistics > Theory and method of social science statistics
Divisions: Universiti Teknologi MARA, Negeri Sembilan > Seremban Campus > Faculty of Computer and Mathematical Sciences
Programme: Bachelor of Science (Hons.) (Computational Mathematics)
Keywords: Numerous, Diffie-Hellman Key Exchange, Diffie-Hellman Key Exchange, LRB method
Date: 2022
URI: https://ir.uitm.edu.my/id/eprint/80631
Edit Item
Edit Item

Download

[thumbnail of 80631.pdf] Text
80631.pdf

Download (216kB)

Digital Copy

Digital (fulltext) is available at:

Physical Copy

Physical status and holdings:
Item Status:

ID Number

80631

Indexing

Statistic

Statistic details