Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol
Paper
Paper/Presentation Title | Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol |
---|---|
Presentation Type | Paper |
Authors | Khader, Aqeel Sahi (Author) and Lai, David (Author) |
Journal or Proceedings Title | Proceedings of the 22nd International Conference on Telecommunications (ICT2015) |
Number of Pages | 5 |
Year | 2015 |
Place of Publication | United States |
ISBN | 9781479980789 |
Digital Object Identifier (DOI) | https://doi.org/10.1109/ICT.2015.7124683 |
Web Address (URL) of Paper | https://ieeexplore.ieee.org/abstract/document/7124683 |
Web Address (URL) of Conference Proceedings | https://ieeexplore.ieee.org/xpl/conhome/7109533/proceeding |
Conference/Event | 22nd International Conference on Telecommunications (ICT2015) |
Event Details | Rank C C C C C C C C C C C C C |
Event Details | 22nd International Conference on Telecommunications (ICT2015) Parent IEEE International Conference on Telecommunications Event Date 27 to end of 29 Apr 2015 Event Location Sydney, Australia |
Abstract | The acceleration in developments in communication technology has led to a consequent increase in the vulnerability of data due to penetration attacks. These attacks often came from outside where non-qualified companies develop IT projects. Cryptography can offer high levels of security but has recently shown vulnerabilities such as the man-in-the-middle (MITM) attack in areas of key exchange protocols, especially in the Diffie-Hellman (DH) protocol. Firstly, this paper presents an overview of MITM attacks targeted at the DH protocol then discusses some of the shortcomings of current defenses. A proposed method to secure DH, which helps secure systems against MITM attacks, is then presented. This method involves the use of Geffe generation of binary sequences. The use of Geffe generator offers high levels of randomness. Data hashed and encrypted using this proposed method will be so difficult to intercept and decrypt without the appropriate keys. This offers high levels of security and helps prevent MITM attacks. |
Keywords | public key; random number generation; data security; cryptography; message authentication; digital signatures |
ANZSRC Field of Research 2020 | 460499. Cybersecurity and privacy not elsewhere classified |
Public Notes | © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Byline Affiliations | School of Agricultural, Computational and Environmental Sciences |
Institution of Origin | University of Southern Queensland |
https://research.usq.edu.au/item/q2zx3/preventing-man-in-the-middle-attack-in-diffie-hellman-key-exchange-protocol
3183
total views16
total downloads3
views this month0
downloads this month