The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri

Numerous approaches to establish secure communication have emerged with the advancement of modern technology to ensure the shared secret are protected from attackers. Protocols for authenticated key exchange serve a significant role in communication security and are widely used in a variety of real-...

Full description

Saved in:
Bibliographic Details
Main Authors: Azman, Nurin Aisyah, Aziz, Nurul Hazirah, Wan Muhammad Sukri, Wan Nur Akliema
Format: Student Project
Language:English
Published: 2022
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/80631/1/80631.pdf
https://ir.uitm.edu.my/id/eprint/80631/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uitm.ir.80631
record_format eprints
spelling my.uitm.ir.806312023-07-04T05:25:03Z https://ir.uitm.edu.my/id/eprint/80631/ The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri Azman, Nurin Aisyah Aziz, Nurul Hazirah Wan Muhammad Sukri, Wan Nur Akliema Statistical data Theory and method of social science statistics Numerous approaches to establish secure communication have emerged with the advancement of modern technology to ensure the shared secret are protected from attackers. Protocols for authenticated key exchange serve a significant role in communication security and are widely used in a variety of real-world network applications. Recent study suggests using modular multiplication instead of exponentiation operation in Diffie-Hellman Key Exchange to securely generating the common session key. However, the processes are not properly discussed. Therefore, the process of applying the Left-to-Right Binary method to compute modular exponentiation that are frequently used in Diffie-Hellman Key Exchange protocol are briefly discussed. Further, our key objective is to develop a mathematical equation using a combination of modular exponentiation and modular multiplication that satisfies the condition of Diffie-Hellman Key Exchange protocol with eight parties. Therefore, in this study we used Left to Right Binary method to compute the common session key, k in Case 1 and each of the participants’ private key in Case 2. As a result, we managed to modify the mathematical equation using a combination of modular exponentiation and modular multiplication, hence making it difficult for an attacker to break into the system since the intruder or any attacker needs to find eight different private keys. In the further, this study can be extended by increasing the number of parties involved which will make any users communicate with each other. Besides that, this study should be repeated using a bigger value for both private key and prime number. Other than that, upcoming research can modify the mathematical equation in either case 1 or case 2 to make sure that the value of the common key is equal. Reason for this is that the LRB method can be applied everywhere in Diffie-Hellman Key Exchange that offers more flexibility if the common key is equal for both cases. Lastly, this study uses numerical example for proving, hence further work may prove the proposed method by computation time for efficiency. 2022 Student Project NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/80631/1/80631.pdf The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri. (2022) [Student Project] (Unpublished)
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
topic Statistical data
Theory and method of social science statistics
spellingShingle Statistical data
Theory and method of social science statistics
Azman, Nurin Aisyah
Aziz, Nurul Hazirah
Wan Muhammad Sukri, Wan Nur Akliema
The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri
description Numerous approaches to establish secure communication have emerged with the advancement of modern technology to ensure the shared secret are protected from attackers. Protocols for authenticated key exchange serve a significant role in communication security and are widely used in a variety of real-world network applications. Recent study suggests using modular multiplication instead of exponentiation operation in Diffie-Hellman Key Exchange to securely generating the common session key. However, the processes are not properly discussed. Therefore, the process of applying the Left-to-Right Binary method to compute modular exponentiation that are frequently used in Diffie-Hellman Key Exchange protocol are briefly discussed. Further, our key objective is to develop a mathematical equation using a combination of modular exponentiation and modular multiplication that satisfies the condition of Diffie-Hellman Key Exchange protocol with eight parties. Therefore, in this study we used Left to Right Binary method to compute the common session key, k in Case 1 and each of the participants’ private key in Case 2. As a result, we managed to modify the mathematical equation using a combination of modular exponentiation and modular multiplication, hence making it difficult for an attacker to break into the system since the intruder or any attacker needs to find eight different private keys. In the further, this study can be extended by increasing the number of parties involved which will make any users communicate with each other. Besides that, this study should be repeated using a bigger value for both private key and prime number. Other than that, upcoming research can modify the mathematical equation in either case 1 or case 2 to make sure that the value of the common key is equal. Reason for this is that the LRB method can be applied everywhere in Diffie-Hellman Key Exchange that offers more flexibility if the common key is equal for both cases. Lastly, this study uses numerical example for proving, hence further work may prove the proposed method by computation time for efficiency.
format Student Project
author Azman, Nurin Aisyah
Aziz, Nurul Hazirah
Wan Muhammad Sukri, Wan Nur Akliema
author_facet Azman, Nurin Aisyah
Aziz, Nurul Hazirah
Wan Muhammad Sukri, Wan Nur Akliema
author_sort Azman, Nurin Aisyah
title The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri
title_short The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri
title_full The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri
title_fullStr The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri
title_full_unstemmed The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri
title_sort binary exponentiation and modular multiplication in diffie hellman key exchange / nurin aisyah azman, nurul hazirah aziz and wan nur akliema wan muhammad sukri
publishDate 2022
url https://ir.uitm.edu.my/id/eprint/80631/1/80631.pdf
https://ir.uitm.edu.my/id/eprint/80631/
_version_ 1770554772338769920
score 13.211869