Enhanced Diffie-Hellman Algorithm For Reliable Key
Enhanced Diffie-Hellman Algorithm For Reliable Key
E-mail: [email protected]
Abstract. The Diffie -Hellman is one of the first public-key procedure and is a certain way of
exchanging the cryptographic keys securely. This concept was introduced by Ralph Markel and
it is named after Whitfield Diffie and Martin Hellman. Sender and Receiver make a common
secret key in Diffie-Hellman algorithm and then they start communicating with each other over
the public channel which is known to everyone. A number of internet services are secured by
Diffie –Hellman. In Public key cryptosystem, the sender has to trust while receiving the public
key of the receiver and vice-versa and this is the challenge of public key cryptosystem. Man-in-
the-Middle attack is very much possible on the existing Diffie-Hellman algorithm. In man-in-
the-middle attack, the attacker exists in the public channel, the attacker receives the public key
of both sender and receiver and sends public keys to sender and receiver which is generated by
his own. This is how man-in-the-middle attack is possible on Diffie- Hellman algorithm.
Denial of service attack is another attack which is found common on Diffie-Hellman. In this
attack, the attacker tries to stop the communication happening between sender and receiver and
attacker can do this by deleting messages or by confusing the parties with miscommunication.
Some more attacks like Insider attack, Outsider attack, etc are possible on Diffie-Hellman. To
reduce the possibility of attacks on Diffie-Hellman algorithm, we have enhanced the Diffie-
Hellman algorithm to a next level. In this paper, we are extending the Diffie –Hellman
algorithm by using the concept of the Diffie -Hellman algorithm to get a stronger secret key
and that secret key is further exchanged between the sender and the receiver so that for each
message, a new secret shared key would be generated. The second secret key will be generated
by taking primitive root of the first secret key.
1. Introduction
Modern cryptography is used in Computer and Communication. Modern cryptography uses binary-
bit sequence. Study of cryptosystem is called Cryptology. Cryptography and Cryptanalysis are the two
branches of Cryptology. Breaking and getting the information part comes under Cryptanalysis.
Cryptography provides information security by giving Confidentiality, Data Integrity, Authentication,
and Non-repudiation to services. A cryptosystem is the execution of cryptographic techniques. A
cryptosystem is made up of plain text, encryption algorithm, cipher text, decryption algorithm, the
encryption key and decryption key. There are two basic types of a cryptosystem, symmetric key
cryptosystem and asymmetric key cryptosystem.
In Symmetric key cryptosystem, the same key is used for encryption and decryption. Key
establishment and Trust Issue are the two main challenges in symmetric key cryptosystem. In
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd 1
14th ICSET-2017 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 263 (2017) 042015 doi:10.1088/1757-899X/263/4/042015
1234567890
Asymmetric key cryptosystem, different key is used for encryption and decryption. Here, the keys are
mathematically related to each other. Asymmetric key cryptosystem is also called as Public key
cryptosystem. The Public-key cryptography comes in the picture along with the Diffie-Hellman
algorithm. Public-Key Cryptography means simply Asymmetric Cryptography which uses public and
private keys to encrypt and decrypt the message. This concept was used by Diffie and Hellman to
exchange the secret key for sending and receiving the messages. One of the most critical problem in
cryptography is exchanging the key between two communicating devices. It was not about
establishing a shared-secret key, but it was about to do it in such a way that anyone who is there at the
communication between the devices do not find out the key. Diffie- Hellman algorithm was first
creditor was Ralph Merkle and this algorithm is named after Whitfield Diffie and Martin Hellman.
This algorithm makes the key exchange secure over a public channel.[1][2] The Diffie – Hellman is
used for public key cryptography, SSL, SSH, PGP and other PKI systems. Many web services uses
Diffie–Hellman for reliable communication and for securing purpose.[3] The most amazing thing in
Diffie-Hellman key exchange is the communication between sender and receiver will happen over the
public channel and for attacker now it’s becoming possible. Some attacks which is possible on the
Diffie-Hellman algorithm: man-in-middle attack, plain-text attack, logjam attack, etc. Logjam attack is
a new type of attack found on the Diffie-Hellman key-exchange protocol which is used in TLS.
We have proposed an upgraded Diffie-Hellman algorithm for more secure and reliable key exchange
and for reliable information exchange between the sender and the receiver.
2
14th ICSET-2017 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 263 (2017) 042015 doi:10.1088/1757-899X/263/4/042015
1234567890
This is how the key exchange takes place in Diffie-Hellman algorithm. The parameter which is known
to attacker is p , q, A, B as these parameters are exchanged on the public channel. So, to know the
shared-secret key of the sender and the receiver, attacker would have to calculate the value of a and b
which is known to only sender and receiver. So, it’s tough for the attacker to get the secret key but not
impossible.[5] Plain text, Man-in- Middle attack, logjam attack and many more attacks which have
found on Diffie-Hellman algorithm which make it possible for an attacker.[6]
3
14th ICSET-2017 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 263 (2017) 042015 doi:10.1088/1757-899X/263/4/042015
1234567890
In this paper, Diffie-Hellman algorithm is extended further and a second shared-secret key is
calculated which is multiplied with an arbitrary number and then exchanged between the sender and
the receiver which makes this algorithm very strong. For the attacker, it will be very tough challenge
for the attacker to find out the key encryption and decryption.
2.1 Mathematical-Background
PRIMITIVE ROOT:
Sender and Receiver choose a prime number p and q as it’s primitive root.
[7] A number q is a primitive root of a number p if every number ‘a’ is coprimeto p is congruent to a
power of q modulo p. That is, for every integer a coprimeto p, there is an integer a such that qa ≡ A
(mod p). Such a is called the index or discrete logarithm of A to the base q modulo p.
For example, if p=7 and q=3 isits primitive root.
And qa mod p = 30 mod 7= 1 mod 7= 1.
= 31 mod 7= 3 mod 7=3.
=32 mod 7=9 mod 7=2.
=33 mod 7= 27 mod 7= 6.
The value of q mod p is coming different every time when the value of ‘a’ is changing. ‘a’ belongs to
a
whole number.
HOW THE SHARED SECRET KEY IS SAME FOR THE SENDER AND RECEIVER:
4
14th ICSET-2017 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 263 (2017) 042015 doi:10.1088/1757-899X/263/4/042015
1234567890
Now, Ram and Sita will take their respective random number ‘h’ and ‘i’ respectively and they will
multiply it with their second shared-secret key (W) and form their respective private keys X= (W*h)
and Y= (W*i) and they will exchange X and Y finally and this will be very hard for the attacker
‘Ravan’.
The sender and receiver get a shared-secret key by using the existing Diffie-Hellman algorithm, now
they find the primitive root of their shared-secret key. Using the Diffie-Hellman algorithm for the
second time and sender and receiver will get a second-secret key. Now, they will take their own
random number from the public channel and they will multiply their second shared-secret key with
their own random number and they will exchange it for getting a new shared secret key for every
message and even for the same message.
5
14th ICSET-2017 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 263 (2017) 042015 doi:10.1088/1757-899X/263/4/042015
1234567890
The use of random number in the already strong second shared-secret key will enhance the security to
a great extent against an attack like Plaintext, Man-in-Middle attack, logjam attack, etc. The
generation of second secret keys every time for every message will make this system stronger as the
attacker doesn’t have any meaningful parameter and he is also unaware of the first shared secret key
‘S’. So, Key can’t be derived as we are generating the second secret key (W). Soit will be very
difficult for attacker to find out the key.
6
14th ICSET-2017 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 263 (2017) 042015 doi:10.1088/1757-899X/263/4/042015
1234567890
5. Conclusion
There are so many attacks possible on the original Diffie-Hellman algorithm. Some of themare :
Known plain-text attack, Logjam attack, Man-in-Middle attack, etc. These attacks are possible on
Diffie-Hellman. The proposed Diffie-Hellman algorithm will definitely make the existing algorithm
very strong.In this paper, we have upgraded the Diffie-Hellman algorithm to a next level for the
reliable key exchange. We have generated second shared secret key from the first shared secret key by
taking the primitive root of the first shared-secret key and finally we are exchanging the keys by
multiplying it with a random parameter for the generation of key each time for every message or even
for the same message. So, this will make the algorithm stronger than before. This reduces the
probability of most of the attacks like known-plaintext attack, etc.The existing algorithm is the making
web services and many more standards and the upgraded Diffie-Hellman algorithm make the existing
algorithm stronger.
References
[1] Vincent P M D R and Sathiyamoorthy E 2014 A Secured and Time Efficient Electronic
Business Framework based on Public Key Cryptography in International Review on Computers
and Software 9(10) 1791-1798
[2] Koziel, Brian, et al. 2016 Neon-Sidh: efficient implementation of supersingular isogeny Diffie-
Hellman key exchange protocol on ARM International Conference on Cryptology and Network
Security Springer International Publishing
[3] Yao, Andrew C and Yunlei Zhao 2013 Method and structure for self-sealed joint proof-of-
knowledge and diffie-hellman key-exchange protocols U.S. Patent No. 8,464,060
[4] Sheffer Y and Fluhrer S 2013 Additional Diffie-Hellman Tests for the Internet Key Exchange
Protocol Version 2 (IKEv2). No. RFC 6989.
[5] Durai Raj Vincent P M and Sathiyamoorthy E 2016 A Novel and efficient public key
encryption algorithm International Journal of Information and communication technology 9(2)
199-211
7
14th ICSET-2017 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 263 (2017) 042015 doi:10.1088/1757-899X/263/4/042015
1234567890