Advances and Applications in Discrete Mathematics

The Advances and Applications in Discrete Mathematics is a prestigious peer-reviewed journal indexed in the Emerging Sources Citation Index (ESCI). It is dedicated to publishing original research articles in the field of discrete mathematics and combinatorics, including topics such as graphs, coding theory, and block design. The journal emphasizes efficient and powerful tools for real-world applications and welcomes expository articles that highlight current developments in the field.

Submit Article

INFORMATION THEORETICALLY SECURE KEY EXCHANGE ALGORITHM

Authors

  • Khaldoun Besoul
  • Qassim AL Mahmoud
  • Ayman Alhalaybeh

Keywords:

key exchange, private encryption, public encryption, integer factorization problem, man in the middle attach, perfect scheme.

DOI:

https://doi.org/10.17654/0974165823023

Abstract

We propose an algorithm that enables secure information and communication channel based on perfect end-to-end key-exchange scheme. The secure channel between two users enables each user to use the public key of the other user to derive a specific private key for both users. In a review of previous work, we have shown that traditional (but yet widely used) security algorithm such as those that use public key encryption are not perfect-secure; the public key encryption (known as N, or the Modules’ Arithmetic Number) makes these schemes to be broken under many kinds of attacks. Unlike these schemes, our approach is not based on the computational assumptions like: Integer Factorization (as for RSA); and Discrete Logarithm Problem (as for Diffie-Hellman). In addition, our approach improved the process to prevent the man-in-the-middle attack which is a crucial problem that remains unsolved.

Received: February 8, 2023;
Accepted: March 20, 2023;

References

R. L. Rivest, A. Shamir and L. Adleman, method for obtaining digital signatures and public key crypto systems, Commun. ACM, 21(2) (1978), 120-126.

W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Trans. Inf. Theory 22(6) (1976), 644-654.

J. Buchmann, F. Göpfert, T. Güneysu, T. Oder and T. Pöppelmann, High-performance and Lightweight Lattice Based Public-Key Encryption, Proc. 2nd ACM Int. Work. IoT Privacy, Trust. Secur. - IoTPTS’ 16 (2016), pp. 2-9.

H. B. Pethe and S. R. Pande, Comparative study and analysis of cryptographic algorithms, International Journal of Advance Research in Computer Science and Management Studies 5(1) (2017), 48-56.

G. C. Kessler, An Overview of Cryptography, Boca Raton: Auerbach Publications, 2017.

N. Priya and M. Kannan, Comparative study of RSA and probabilistic encryption, International Journal of Engineering and Computer Science 6(1) (2017), 19867-19871.

Nordrum, Tech-Talk: IEEE Spectrum, IEEE Spectrum, 3 March 2016. [Online]. Available:

http://spectrum.ieee.org/tech-talk/computing/hardware/encryptionbusting-quantum-computer-practices-factoring-in-scalable-fiveatom-experiment [Accessed 19 March 2017].

B. Steyn, Essays: Doctrina.org, Doctrina.org, 26 May 2012. [Online]. Available: http://doctrina.org/How-RSA-Works-With-Examples.html [Accessed 19 March 2017].

E. Frenkel, Articles: Slate.com, Slate.com, 3 June 2013. [Online]. Available: http://www.slate.com/articles/health_and_science/science/2013/06/online_credit_card_security_the_rsa_algorithm_prime_numbers_and_pierre_fermat.html [Accessed 20 March 2017].

M. Rouse, Network Security: Search security.Techtarget.com, November 2014. [Online]. Available: http://searchsecurity.techtarget.com/definition/RSA [Accessed 19 March 2017].

S. D. Schoen, www.loyalty.org, Loyalty.org, [Online]. Available: http://www.loyalty.org/~schoen/rsa/ [Accessed 22 March 2017].

Information Technology Laboratory, Digital Signature Standard (DSS), National Institute of Standards and Technology, Gaithersburg, 2013.

L. Van Thai, McEliece cryptosystem-based identification and signature scheme using chained BCH codes, (2015), 122-127.

Published

2023-04-11

Issue

Section

Articles

How to Cite

INFORMATION THEORETICALLY SECURE KEY EXCHANGE ALGORITHM. (2023). Advances and Applications in Discrete Mathematics, 38(1), 111-125. https://doi.org/10.17654/0974165823023

Similar Articles

1-10 of 51

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)