Cryptology ePrint Archive: Report 2021/647

privateDH: An Enhanced Diffie-Hellman Key-Exchange Protocol using RSA and AES Algorithm

Ripon Patgiri

Abstract: RSA cryptography is an asymmetric communication protocol, and it is facing diverse issues. Recent research works suggest that RSA security has already broken. On the contrary, AES is the most used symmetric-key cryptography protocol, and it is also facing issues. Literature search suggests that there is an issue of cryptanalysis attacks. A shared secret key requires for AES cryptography. The most famous key exchange protocol is Diffie-Hellman; however, it has an issue of the number field sieve discrete log algorithm attacks. Moreover, recent research suggested that Diffie-Hellman is less secure than widely perceived. Moreover, there is another issue of Logjam attack that allows man-in-middle attack in Diffie-Hellman. Thus, we combine RSA, AES, and Diffie-Hellman algorithm to provide security on the key exchange protocol, called privateDH. Our key objective is to provide security to the Diffie-Hellman Algorithm. Therefore, privateDH does not share the data publicly with the intended party. Instead, privateDH encrypts all shareable data in the time of key exchange by encrypting using the AES algorithm. privateDH uses the RSA algorithm and retrieves the public key to avoid a man-in-the-middle attack. Thus, we demonstrate how to provide security to the Diffie-Hellman algorithm to defeat various kinds of attacks.

Category / Keywords: secret-key cryptography / Key exchange protocol, Diffie-Hellman, Cryptanalysis, RSA, AES, Symmetric Cryptography

Date: received 17 May 2021

Contact author: ripon at cse nits ac in

Available format(s): PDF | BibTeX Citation

Note: Submitted to IEEE for possible publication

Version: 20210520:202705 (All versions of this report)

Short URL: ia.cr/2021/647


[ Cryptology ePrint archive ]