Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol

Main Authors: Kara, Mostefa; El Oued University, Laouid, Abdelkader; El Oued University, AlShaikh, Muath, Bounceur, Ahcène, Hammoudeh, Mohammad
Format: Article info application/pdf eJournal
Bahasa: eng
Terbitan: Universitas Ahmad Dahlan , 2021
Subjects:
Online Access: http://journal.uad.ac.id/index.php/JITEKI/article/view/22210
http://journal.uad.ac.id/index.php/JITEKI/article/view/22210/pdf_89
Daftar Isi:
  • One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a widely used technique on which key exchange systems around the world depend. This protocol is simple and uncomplicated, and its robustness is based on the Discrete Logarithm Problem (DLP). Despite this, he is considered weak against the man-in-the-middle attack. This article presents a completely different version of the DHP protocol. The proposed version is based on two verification stages. In the first step, we check if the pseudo-random value α that Alice sends to Bob has been manipulated! In the second step, we make sure that the random value Î2 that Bob sends to Alice is not manipulated. The man-in-the-middle attacker Eve can impersonate neither Alice nor Bob, manipulate their exchanged values, or discover the secret encryption key.