### Stealth: A Highly Secured End-to-End Symmetric Communication Protocol

Ripon Patgiri

##### Abstract

Symmetric key cryptography is applied in almost all secure communications to protect all sensitive information from attackers, for instance, banking, and thus, it requires extra attention due to diverse applications. Moreover, it is vulnerable to various attacks, for example, cryptanalysis attacks. Cryptanalysis attacks are possible due to a single-keyed encryption system. The state-of-the-art symmetric communication protocol uses a single secret key to encrypt/decrypt the entire communication to exchange data/message that poses security threats. Therefore, in this paper, we present a new secure communication protocol based on Diffie-Hellman cryptographic algorithms, called Stealth. It is a symmetric-key cryptographic protocol to enhance the security of modern communication with truly random numbers. Additionally, it applies a pseudo-random number generator. Initially, Stealth uses the Diffie-Hellman algorithm to compute four shared secret keys. These shared secret keys are used to generate four different private keys to encrypt for the first block of the message for symmetric communication. Stealth changes its private keys in each communication, making it very hard to break the security protocol. Moreover, the four shared secret keys create additional complexity for the adversary to overcome, and hence, it can provide highly tight security in communications. Stealth neither replaces the existing protocol nor authentication mechanism, but it creates another security layer to the existing protocol to ensure the security measurement's tightness.

Note: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible.

##### Metadata
Available format(s)
Category
Cryptographic protocols
Publication info
Preprint. Minor revision.
Keywords
secret sharingsecret-key cryptographypseudo-randomnesscryptanalysisblock cipher
Contact author(s)
ripon @ cse nits ac in
History
2021-05-17: received
Short URL
https://ia.cr/2021/622
License

CC BY

BibTeX

@misc{cryptoeprint:2021/622,
author = {Ripon Patgiri},
title = {Stealth: A Highly Secured End-to-End Symmetric Communication Protocol},
howpublished = {Cryptology ePrint Archive, Paper 2021/622},
year = {2021},
note = {\url{https://eprint.iacr.org/2021/622}},
url = {https://eprint.iacr.org/2021/622}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.