Author:
Samuel Galu Terfa,A. Adeyelu Adekunle,Uga Otor Samera
Abstract
In today's interconnected digital landscape, ensuring data security in transit is paramount amidst the constant threat of adversaries exploiting vulnerabilities in communication channels. This study introduces an enhanced Diffie-Hellman key exchange algorithm designed to bolster data encryption against Man-in-the-Middle (MITM) attacks. The objectives include the development of a novel Diffie-Hellman key exchange model to ensure confidentiality and integrity of data during transit, along with implementing measures to thwart MITM attacks. Additionally, the study integrates a time-based key expiration mechanism within the Diffie-Hellman framework to facilitate secure data transmission while enforcing user authentication. The proposed model was simulated using the Hypertext Preprocessor (PHP) programming language, enabling comprehensive evaluation of performance metrics such as execution time, computational overhead, security strength, and adherence to Burrows-Abadi-Needham (BAN) logic. Rigorous testing and analysis demonstrate the efficacy of the enhanced Diffie-Hellman algorithm in safeguarding data integrity and confidentiality during transit, offering a robust solution against evolving cyber threats.
Publisher
International Journal of Innovative Science and Research Technology
Reference35 articles.
1. S. Srilaya and S. Velampalli, “Cryptography: The Key Technology for Security Management,” Int. J. Res. Anal. Rev., vol. 7, no. 1, pp. 621–629, 2020.
2. A. M. Banaamah and I. Ahmad, “Intrusion Detection in IoT Using Deep Learning,” Sensors, vol. 22, no. 21, 2022, doi: 10.3390/s22218417.
3. M. R. Mishra and J. Kar, “a Study on Diffie-Hellman Key Exchange Protocols,” Int. J. Pure Apllied Math., vol. 114, no. 2, pp. 179–189, 2017, doi: 10.12732/ijpam.v114i2.2.
4. H. M. Ahmed and R. W. Jassim, “Enhanced Diffie-Hellman Algorithm for Data Transmission Security,” pp. 316–335, 2020.
5. M. Kara, A. Laouid, M. AlShaikh, A. Bounceur, and M. Hammoudeh, “Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol,” J. Ilm. Tek. Elektro Komput. dan Inform., vol. 7, no. 3, p. 380, 2021, doi: 10.26555/jiteki.v7i3.22210.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献