The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri
Numerous approaches to establish secure communication have emerged with the advancement of modern technology to ensure the shared secret are protected from attackers. Protocols for authenticated key exchange serve a significant role in communication security and are widely used in a variety of real-...
Saved in:
Main Authors: | , , |
---|---|
Format: | Student Project |
Language: | English |
Published: |
2022
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/80631/1/80631.pdf https://ir.uitm.edu.my/id/eprint/80631/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uitm.ir.80631 |
---|---|
record_format |
eprints |
spelling |
my.uitm.ir.806312023-07-04T05:25:03Z https://ir.uitm.edu.my/id/eprint/80631/ The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri Azman, Nurin Aisyah Aziz, Nurul Hazirah Wan Muhammad Sukri, Wan Nur Akliema Statistical data Theory and method of social science statistics Numerous approaches to establish secure communication have emerged with the advancement of modern technology to ensure the shared secret are protected from attackers. Protocols for authenticated key exchange serve a significant role in communication security and are widely used in a variety of real-world network applications. Recent study suggests using modular multiplication instead of exponentiation operation in Diffie-Hellman Key Exchange to securely generating the common session key. However, the processes are not properly discussed. Therefore, the process of applying the Left-to-Right Binary method to compute modular exponentiation that are frequently used in Diffie-Hellman Key Exchange protocol are briefly discussed. Further, our key objective is to develop a mathematical equation using a combination of modular exponentiation and modular multiplication that satisfies the condition of Diffie-Hellman Key Exchange protocol with eight parties. Therefore, in this study we used Left to Right Binary method to compute the common session key, k in Case 1 and each of the participants’ private key in Case 2. As a result, we managed to modify the mathematical equation using a combination of modular exponentiation and modular multiplication, hence making it difficult for an attacker to break into the system since the intruder or any attacker needs to find eight different private keys. In the further, this study can be extended by increasing the number of parties involved which will make any users communicate with each other. Besides that, this study should be repeated using a bigger value for both private key and prime number. Other than that, upcoming research can modify the mathematical equation in either case 1 or case 2 to make sure that the value of the common key is equal. Reason for this is that the LRB method can be applied everywhere in Diffie-Hellman Key Exchange that offers more flexibility if the common key is equal for both cases. Lastly, this study uses numerical example for proving, hence further work may prove the proposed method by computation time for efficiency. 2022 Student Project NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/80631/1/80631.pdf The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri. (2022) [Student Project] (Unpublished) |
institution |
Universiti Teknologi Mara |
building |
Tun Abdul Razak Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Mara |
content_source |
UiTM Institutional Repository |
url_provider |
http://ir.uitm.edu.my/ |
language |
English |
topic |
Statistical data Theory and method of social science statistics |
spellingShingle |
Statistical data Theory and method of social science statistics Azman, Nurin Aisyah Aziz, Nurul Hazirah Wan Muhammad Sukri, Wan Nur Akliema The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri |
description |
Numerous approaches to establish secure communication have emerged with the advancement of modern technology to ensure the shared secret are protected from attackers. Protocols for authenticated key exchange serve a significant role in communication security and are widely used in a variety of real-world network applications. Recent study suggests using modular multiplication instead of exponentiation operation in Diffie-Hellman Key Exchange to securely generating the common session key. However, the processes are not properly discussed. Therefore, the process of applying the Left-to-Right Binary method to compute modular exponentiation that are frequently used in Diffie-Hellman Key Exchange protocol are briefly discussed. Further, our key objective is to develop a mathematical equation using a combination of modular exponentiation and modular multiplication that satisfies the condition of Diffie-Hellman Key Exchange protocol with eight parties. Therefore, in this study we used Left to Right Binary method to compute the common session key, k in Case 1 and each of the participants’ private key in Case 2. As a result, we managed to modify the mathematical equation using a combination of modular exponentiation and modular multiplication, hence making it difficult for an attacker to break into the system since the intruder or any attacker needs to find eight different private keys. In the further, this study can be extended by increasing the number of parties involved which will make any users communicate with each other. Besides that, this study should be repeated using a bigger value for both private key and prime number. Other than that, upcoming research can modify the mathematical equation in either case 1 or case 2 to make sure that the value of the common key is equal. Reason for this is that the LRB method can be applied everywhere in Diffie-Hellman Key Exchange that offers more flexibility if the common key is equal for both cases. Lastly, this study uses numerical example for proving, hence further work may prove the proposed method by computation time for efficiency. |
format |
Student Project |
author |
Azman, Nurin Aisyah Aziz, Nurul Hazirah Wan Muhammad Sukri, Wan Nur Akliema |
author_facet |
Azman, Nurin Aisyah Aziz, Nurul Hazirah Wan Muhammad Sukri, Wan Nur Akliema |
author_sort |
Azman, Nurin Aisyah |
title |
The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri |
title_short |
The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri |
title_full |
The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri |
title_fullStr |
The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri |
title_full_unstemmed |
The Binary exponentiation and modular multiplication in Diffie Hellman Key Exchange / Nurin Aisyah Azman, Nurul Hazirah Aziz and Wan Nur Akliema Wan Muhammad Sukri |
title_sort |
binary exponentiation and modular multiplication in diffie hellman key exchange / nurin aisyah azman, nurul hazirah aziz and wan nur akliema wan muhammad sukri |
publishDate |
2022 |
url |
https://ir.uitm.edu.my/id/eprint/80631/1/80631.pdf https://ir.uitm.edu.my/id/eprint/80631/ |
_version_ |
1770554772338769920 |
score |
13.211869 |