Secure Cryptography with ngDH protocol along with RSA & AES Algorithm

نویسندگان

چکیده

Abstract—RSA cryptography is an asymmetric communication protocol, and, AES the most used symmetric-key both are facing cryptanalysis attacks.. The famous key exchange protocol Diffie-Hellman; but it has issue of Logjam attack that allows man-in-middle in Diffie-Hellman. Thus, we combine RSA, AES, and Diffie-Hellman algorithm to provide security on called next generationDH or ngDH. Our objective Algorithm. Therefore, ngDH does not share data publicly with intended party. Instead, encrypts all shareable time by encrypting using algorithm. uses RSA retrieves public avoid a man-in-the-middle attack. demonstrate how defeat various kinds attacks. Index Terms—Cryptography, cryptography, Diffie-Hellman, Symmetric, Asymmetric, Public key, Encryption, Attacks, Security, Networking, Communication.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

Now a days sharing the information over internet is becoming a critical issue due to security problems. Hence more techniques are needed to protect the shared data in an unsecured channel. The present work focus on combination of cryptography and steganography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network...

متن کامل

Comparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmissions

In today’s mobile communication systems, security offered by the network operator is often limited to the wireless link. This means that data delivered through mobile networks are not sufficiently protected. In the particular growing field of interest of machine-to-machine (M2M) communications, these applications typically require a mobile, secure and reliable means of data communication. This ...

متن کامل

Analysis on AES Algorithm using symmetric cryptography

In this paper we present the protection of long lived private key & public key using cryptographic schemes is one of the most important issues for information security. Any cryptographic scheme that reveals private key and public key will soon its security absolutely disintegrates. Public key are used in two different based, i.e. RSA and elliptic curve cryptography both are modular based arithm...

متن کامل

Simple Identity-Based Cryptography with Mediated RSA

Identity-based public key encryption facilitates easy introduction of public key cryptography by allowing an entity’s public key to be derived from an arbitrary identification value, such as name or email address. The main practical benefit of identity-based cryptography is in greatly reducing the need for, and reliance on, public key certificates. Although some interesting identity-based techn...

متن کامل

1. AES seems weak. 2. Linear time secure cryptography

We describe a new simple but more powerful form of linear cryptanalysis. It appears to break AES (and undoubtably other cryptosystems too, e.g. SKIPJACK). The break is “nonconstructive,” i.e. we make it plausible (e.g. prove it in certain approximate probabilistic models) that a small algorithm for quickly determining AES-256 keys from plaintext-ciphertext pairs exists – but without constructin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indian Scientific Journal Of Research In Engineering And Management

سال: 2022

ISSN: ['2582-3930']

DOI: https://doi.org/10.55041/ijsrem11503