Paper 2021/647

privateDH: An Enhanced Diffie-Hellman Key-Exchange Protocol using RSA and AES Algorithm

Ripon Patgiri

Abstract

RSA cryptography is an asymmetric communication protocol, and it is facing diverse issues. Recent research works suggest that RSA security has already broken. On the contrary, AES is the most used symmetric-key cryptography protocol, and it is also facing issues. Literature search suggests that there is an issue of cryptanalysis attacks. A shared secret key requires for AES cryptography. The most famous key exchange protocol is Diffie-Hellman; however, it has an issue of the number field sieve discrete log algorithm attacks. Moreover, recent research suggested that Diffie-Hellman is less secure than widely perceived. Moreover, there is another issue of Logjam attack that allows man-in-middle attack in Diffie-Hellman. Thus, we combine RSA, AES, and Diffie-Hellman algorithm to provide security on the key exchange protocol, called privateDH. Our key objective is to provide security to the Diffie-Hellman Algorithm. Therefore, privateDH does not share the data publicly with the intended party. Instead, privateDH encrypts all shareable data in the time of key exchange by encrypting using the AES algorithm. privateDH uses the RSA algorithm and retrieves the public key to avoid a man-in-the-middle attack. Thus, we demonstrate how to provide security to the Diffie-Hellman algorithm to defeat various kinds of attacks.

Note: Submitted to IEEE for possible publication

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Key exchange protocolDiffie-HellmanCryptanalysisRSAAESSymmetric Cryptography
Contact author(s)
ripon @ cse nits ac in
History
2022-03-06: revised
2021-05-20: received
See all versions
Short URL
https://ia.cr/2021/647
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/647,
      author = {Ripon Patgiri},
      title = {{privateDH}: An Enhanced Diffie-Hellman Key-Exchange Protocol using {RSA} and {AES} Algorithm},
      howpublished = {Cryptology {ePrint} Archive, Paper 2021/647},
      year = {2021},
      url = {https://eprint.iacr.org/2021/647}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.