An Improved Deffie Hellman Scheme for Mitigating an Eavesdropping Attack on a Network


Authors : Terfa Samuel Galu; Adekunle A. Adeyelu; Samera Uga Otor

Volume/Issue : Volume 9 - 2024, Issue 4 - April

Google Scholar : https://tinyurl.com/3d82k9wk

Scribd : https://tinyurl.com/yc3yb6sk

DOI : https://doi.org/10.38124/ijisrt/IJISRT24APR2479

Abstract : In today's interconnected digital landscape, ensuring data security in transit is paramount amidst the constant threat of adversaries exploiting vulnerabilities in communication channels. This study introduces an enhanced Diffie-Hellman key exchange algorithm designed to bolster data encryption against Man-in-the-Middle (MITM) attacks. The objectives include the development of a novel Diffie-Hellman key exchange model to ensure confidentiality and integrity of data during transit, along with implementing measures to thwart MITM attacks. Additionally, the study integrates a time-based key expiration mechanism within the Diffie-Hellman framework to facilitate secure data transmission while enforcing user authentication. The proposed model was simulated using the Hypertext Preprocessor (PHP) programming language, enabling comprehensive evaluation of performance metrics such as execution time, computational overhead, security strength, and adherence to Burrows-Abadi-Needham (BAN) logic. Rigorous testing and analysis demonstrate the efficacy of the enhanced Diffie-Hellman algorithm in safeguarding data integrity and confidentiality during transit, offering a robust solution against evolving cyber threats.

Keywords : Deffie-Hellman, Data Encryption, Data Decryption, Man-In-The-Middle, BAN Logic.

References :

  1. S. Srilaya and S. Velampalli, “Cryptography: The Key Technology for Security Management,” Int. J. Res. Anal. Rev., vol. 7, no. 1, pp. 621–629, 2020.
  2. A. M. Banaamah and I. Ahmad, “Intrusion Detection in IoT Using Deep Learning,” Sensors, vol. 22, no. 21, 2022, doi: 10.3390/s22218417.
  3. M. R. Mishra and J. Kar, “a Study on Diffie-Hellman Key Exchange Protocols,” Int. J. Pure Apllied Math., vol. 114, no. 2, pp. 179–189, 2017, doi: 10.12732/ijpam.v114i2.2.
  4. H. M. Ahmed and R. W. Jassim, “Enhanced Diffie-Hellman Algorithm for Data Transmission Security,” pp. 316–335, 2020.
  5. M. Kara, A. Laouid, M. AlShaikh, A. Bounceur, and M. Hammoudeh, “Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol,” J. Ilm. Tek. Elektro Komput. dan Inform., vol. 7, no. 3, p. 380, 2021, doi: 10.26555/jiteki.v7i3.22210.
  6. P. P. Thwe and M. Htet, “Prevention of Man-In-The-Middle Attack in Diffie-Hellman Key Exchange Algorithm using Proposed Hash Function,” Int. J. Adv. Sci. Res. Eng., vol. 05, no. 10, pp. 192–203, 2019, doi: 10.31695/ijasre.2019.33560.
  7. J. O. Odeh, “Totally Antimagic Total Labelling of a Complete Bipartite Graph and its Application in End-to-End Encryption Totally Antimagic Total Labelling of a Complete Bipartite Graph and its Application in End-to-End Encryption,” no. January, 2024.
  8. A. Khaldi, “Diffie-hellman key exchange through steganographied images,” Rev. Direito, Estado e Telecomunicacoes, vol. 10, no. 1, pp. 147–160, 2018, doi: 10.26512/lstr.v10i1.21504.
  9. N. P. Owoh and M. M. Singh, “Applying Diffie-Hellman algorithm to solve the key agreement problem in mobile blockchain-based sensing applications,” Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 3, pp. 59–68, 2019, doi: 10.14569/IJACSA.2019.0100308.
  10. P. Thapar and U. Batra, “Implementation of Elliptical Curve Cryptography Based Diffie-Hellman Key Exchange Mechanism in Contiki Operating System for Internet of Things,” Int. J. Electr. Electron. Res., vol. 10, no. 2, pp. 335–340, 2022, doi: 10.37391/IJEER.100245.
  11. K. H. Moussa, A. H. El-Sakka, S. Shaaban, and H. N. Kheirallah, “Group Security Authentication and Key Agreement Protocol Built by Elliptic Curve Diffie Hellman Key Exchange for LTE Military Grade Communication,” IEEE Access, vol. 10, no. July, pp. 80352–80364, 2022, doi: 10.1109/ACCESS.2022.3195304.

In today's interconnected digital landscape, ensuring data security in transit is paramount amidst the constant threat of adversaries exploiting vulnerabilities in communication channels. This study introduces an enhanced Diffie-Hellman key exchange algorithm designed to bolster data encryption against Man-in-the-Middle (MITM) attacks. The objectives include the development of a novel Diffie-Hellman key exchange model to ensure confidentiality and integrity of data during transit, along with implementing measures to thwart MITM attacks. Additionally, the study integrates a time-based key expiration mechanism within the Diffie-Hellman framework to facilitate secure data transmission while enforcing user authentication. The proposed model was simulated using the Hypertext Preprocessor (PHP) programming language, enabling comprehensive evaluation of performance metrics such as execution time, computational overhead, security strength, and adherence to Burrows-Abadi-Needham (BAN) logic. Rigorous testing and analysis demonstrate the efficacy of the enhanced Diffie-Hellman algorithm in safeguarding data integrity and confidentiality during transit, offering a robust solution against evolving cyber threats.

Keywords : Deffie-Hellman, Data Encryption, Data Decryption, Man-In-The-Middle, BAN Logic.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe