Secure Cryptography with ngDH protocol along with RSA & AES Algorithm
نویسندگان
چکیده
Abstract—RSA cryptography is an asymmetric communication protocol, and, AES the most used symmetric-key both are facing cryptanalysis attacks.. The famous key exchange protocol Diffie-Hellman; but it has issue of Logjam attack that allows man-in-middle in Diffie-Hellman. Thus, we combine RSA, AES, and Diffie-Hellman algorithm to provide security on called next generationDH or ngDH. Our objective Algorithm. Therefore, ngDH does not share data publicly with intended party. Instead, encrypts all shareable time by encrypting using algorithm. uses RSA retrieves public avoid a man-in-the-middle attack. demonstrate how defeat various kinds attacks. Index Terms—Cryptography, cryptography, Diffie-Hellman, Symmetric, Asymmetric, Public key, Encryption, Attacks, Security, Networking, Communication.
منابع مشابه
A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique
Now a days sharing the information over internet is becoming a critical issue due to security problems. Hence more techniques are needed to protect the shared data in an unsecured channel. The present work focus on combination of cryptography and steganography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network...
متن کاملComparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmissions
In today’s mobile communication systems, security offered by the network operator is often limited to the wireless link. This means that data delivered through mobile networks are not sufficiently protected. In the particular growing field of interest of machine-to-machine (M2M) communications, these applications typically require a mobile, secure and reliable means of data communication. This ...
متن کاملAnalysis on AES Algorithm using symmetric cryptography
In this paper we present the protection of long lived private key & public key using cryptographic schemes is one of the most important issues for information security. Any cryptographic scheme that reveals private key and public key will soon its security absolutely disintegrates. Public key are used in two different based, i.e. RSA and elliptic curve cryptography both are modular based arithm...
متن کاملSimple Identity-Based Cryptography with Mediated RSA
Identity-based public key encryption facilitates easy introduction of public key cryptography by allowing an entity’s public key to be derived from an arbitrary identification value, such as name or email address. The main practical benefit of identity-based cryptography is in greatly reducing the need for, and reliance on, public key certificates. Although some interesting identity-based techn...
متن کامل1. AES seems weak. 2. Linear time secure cryptography
We describe a new simple but more powerful form of linear cryptanalysis. It appears to break AES (and undoubtably other cryptosystems too, e.g. SKIPJACK). The break is “nonconstructive,” i.e. we make it plausible (e.g. prove it in certain approximate probabilistic models) that a small algorithm for quickly determining AES-256 keys from plaintext-ciphertext pairs exists – but without constructin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indian Scientific Journal Of Research In Engineering And Management
سال: 2022
ISSN: ['2582-3930']
DOI: https://doi.org/10.55041/ijsrem11503