SPDH - A Secure Plain Diffie-Hellman Algorithm
DOI:
https://doi.org/10.13052/jcsm2245-1439.1231Keywords:
secure Diffie–Hellman algorithm, AES, HMAC, Man-in-the-Middle attacks, replay attacksAbstract
Secure communication in a wireless system or end-to-end communication requires setup of a shared secret. This shared secret can be obtained by the use of a public key cryptography system. The most widely used algorithm to obtain a shared secret is the Diffie–Hellman algorithm. However, this algorithm suffers from the Man-in-the-Middle problem; an attacker can perform an eavesdropping attack listen to the communication between participants A and B. Other algorithms as for instance ECMQV (Elliptic Curve Menezes Qo Vanstone) can handle this problem but is far more complex and slower because the algorithm is a three-pass algorithm whereas the Diffie–Hellman algorithm is a simple two-pass algorithm. Using standard cryptographic modules as AES and HMAC the purposed algorithm, Secure Plain Diffie–Hellman Algorithm, solves the Man-in-the-Middle problem and maintain its advantage from the plain Diffie–Hellman algorithm. Also the possibilities of replay attacks are solved by use of a timestamp.
Downloads
References
Hankerson et al. Guide to EllipticCurve Cryptography. Springer, 2004.
D. Boneh. Twenty years of attacks on the RSA cryptosystem. Notices of the AmericanMathematical Society (AMS), 46(2):203–213, 1999.
F. Blake (Ed.). Advances in Elliptic Curve Cryptography. Cambridge University Press,2005.
Mario Cagalj, Srdjan Capkun, and Jean-Pierre Hubaux. Key agreement in peer-to-peerwireless networks. IEEE (Special Issue on Cryptography and Security). bibitem5. RFC5246, 2008.
Hai Huang and Zhenfu Cao. An ID-based authenticated key exchange protocol basedon bilinear Diffie–Hellman problem. Department of Computer Science and Engineering,Shanghai Jiaotong University, ASIACCS, 2009.
Jooyoung Lee and Je Hong Park. Authenticated key exchange secure under thecomputational Diffie–Hellman assumption. The Attached Institute of Electronics andTelecommunications Research Institute, Korea, IACR, 2008.
W. Trappe and L.C. Washington. Introduction to Cryptography with Coding Theory(second edition). Pearson, 2006.
RFC 2104.
Priyanka Goyal, Sahil Batra, and Ajit Singh. A literature review of security attack inmobile ad-hoc networks. International Journal of Computer Applications, 9(12):11–15,November 2010.