z-logo
open-access-imgOpen Access
Secure Cryptography with ngDH protocol along with RSA & AES Algorithm
Author(s) -
Vivek Singh Rajput
Publication year - 2022
Publication title -
indian scientific journal of research in engineering and management
Language(s) - English
Resource type - Journals
ISSN - 2582-3930
DOI - 10.55041/ijsrem11503
Subject(s) - key exchange , diffie–hellman key exchange , computer science , public key cryptography , cryptography , cryptanalysis , computer security , id based cryptography , key agreement protocol , symmetric key algorithm , encryption , key (lock) , pkcs #1 , neural cryptography , key size , algorithm , key distribution
—RSA cryptography is an asymmetric communication protocol, and, AES is the most used symmetric-key cryptography protocol, both are facing cryptanalysis attacks.. The most famous key exchange protocol is Diffie-Hellman; but it has an issue of Logjam attack that allows man-in-middle attack in Diffie-Hellman. Thus, we combine RSA, AES, and Diffie-Hellman algorithm to provide security on the key exchange protocol, called next generationDH or ngDH. Our key objective is to provide security to the Diffie-Hellman Algorithm. Therefore, ngDH does not share the data publicly with the intended party. Instead, ngDH encrypts all shareable data in the time of key exchange by encrypting using the AES algorithm. ngDH uses the RSA algorithm and retrieves the public key to avoid a man-in-the-middle attack. Thus, we demonstrate how to provide security to the Diffie-Hellman algorithm to defeat various kinds of attacks. Index Terms—Cryptography, RSA cryptography, Diffie-Hellman, Symmetric, Asymmetric, Public key, Encryption, Attacks, Security, Networking, Communication.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here