Authors :
Terfa Samuel Galu; Adekunle A. Adeyelu; Samera Uga Otor
Volume/Issue :
Volume 9 - 2024, Issue 4 - April
Google Scholar :
https://tinyurl.com/3d82k9wk
Scribd :
https://tinyurl.com/yc3yb6sk
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24APR2479
Abstract :
In today's interconnected digital landscape,
ensuring data security in transit is paramount amidst the
constant threat of adversaries exploiting vulnerabilities in
communication channels. This study introduces an
enhanced Diffie-Hellman key exchange algorithm designed
to bolster data encryption against Man-in-the-Middle
(MITM) attacks. The objectives include the development of
a novel Diffie-Hellman key exchange model to ensure
confidentiality and integrity of data during transit, along
with implementing measures to thwart MITM attacks.
Additionally, the study integrates a time-based key
expiration mechanism within the Diffie-Hellman
framework to facilitate secure data transmission while
enforcing user authentication. The proposed model was
simulated using the Hypertext Preprocessor (PHP)
programming language, enabling comprehensive
evaluation of performance metrics such as execution time,
computational overhead, security strength, and adherence
to Burrows-Abadi-Needham (BAN) logic. Rigorous testing
and analysis demonstrate the efficacy of the enhanced
Diffie-Hellman algorithm in safeguarding data integrity
and confidentiality during transit, offering a robust solution
against evolving cyber threats.
Keywords :
Deffie-Hellman, Data Encryption, Data Decryption, Man-In-The-Middle, BAN Logic.
References :
- S. Srilaya and S. Velampalli, “Cryptography: The Key Technology for Security Management,” Int. J. Res. Anal. Rev., vol. 7, no. 1, pp. 621–629, 2020.
- A. M. Banaamah and I. Ahmad, “Intrusion Detection in IoT Using Deep Learning,” Sensors, vol. 22, no. 21, 2022, doi: 10.3390/s22218417.
- M. R. Mishra and J. Kar, “a Study on Diffie-Hellman Key Exchange Protocols,” Int. J. Pure Apllied Math., vol. 114, no. 2, pp. 179–189, 2017, doi: 10.12732/ijpam.v114i2.2.
- H. M. Ahmed and R. W. Jassim, “Enhanced Diffie-Hellman Algorithm for Data Transmission Security,” pp. 316–335, 2020.
- M. Kara, A. Laouid, M. AlShaikh, A. Bounceur, and M. Hammoudeh, “Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol,” J. Ilm. Tek. Elektro Komput. dan Inform., vol. 7, no. 3, p. 380, 2021, doi: 10.26555/jiteki.v7i3.22210.
- P. P. Thwe and M. Htet, “Prevention of Man-In-The-Middle Attack in Diffie-Hellman Key Exchange Algorithm using Proposed Hash Function,” Int. J. Adv. Sci. Res. Eng., vol. 05, no. 10, pp. 192–203, 2019, doi: 10.31695/ijasre.2019.33560.
- J. O. Odeh, “Totally Antimagic Total Labelling of a Complete Bipartite Graph and its Application in End-to-End Encryption Totally Antimagic Total Labelling of a Complete Bipartite Graph and its Application in End-to-End Encryption,” no. January, 2024.
- A. Khaldi, “Diffie-hellman key exchange through steganographied images,” Rev. Direito, Estado e Telecomunicacoes, vol. 10, no. 1, pp. 147–160, 2018, doi: 10.26512/lstr.v10i1.21504.
- N. P. Owoh and M. M. Singh, “Applying Diffie-Hellman algorithm to solve the key agreement problem in mobile blockchain-based sensing applications,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 3, pp. 59–68, 2019, doi: 10.14569/IJACSA.2019.0100308.
- P. Thapar and U. Batra, “Implementation of Elliptical Curve Cryptography Based Diffie-Hellman Key Exchange Mechanism in Contiki Operating System for Internet of Things,” Int. J. Electr. Electron. Res., vol. 10, no. 2, pp. 335–340, 2022, doi: 10.37391/IJEER.100245.
- K. H. Moussa, A. H. El-Sakka, S. Shaaban, and H. N. Kheirallah, “Group Security Authentication and Key Agreement Protocol Built by Elliptic Curve Diffie Hellman Key Exchange for LTE Military Grade Communication,” IEEE Access, vol. 10, no. July, pp. 80352–80364, 2022, doi: 10.1109/ACCESS.2022.3195304.
In today's interconnected digital landscape,
ensuring data security in transit is paramount amidst the
constant threat of adversaries exploiting vulnerabilities in
communication channels. This study introduces an
enhanced Diffie-Hellman key exchange algorithm designed
to bolster data encryption against Man-in-the-Middle
(MITM) attacks. The objectives include the development of
a novel Diffie-Hellman key exchange model to ensure
confidentiality and integrity of data during transit, along
with implementing measures to thwart MITM attacks.
Additionally, the study integrates a time-based key
expiration mechanism within the Diffie-Hellman
framework to facilitate secure data transmission while
enforcing user authentication. The proposed model was
simulated using the Hypertext Preprocessor (PHP)
programming language, enabling comprehensive
evaluation of performance metrics such as execution time,
computational overhead, security strength, and adherence
to Burrows-Abadi-Needham (BAN) logic. Rigorous testing
and analysis demonstrate the efficacy of the enhanced
Diffie-Hellman algorithm in safeguarding data integrity
and confidentiality during transit, offering a robust solution
against evolving cyber threats.
Keywords :
Deffie-Hellman, Data Encryption, Data Decryption, Man-In-The-Middle, BAN Logic.