An Alternative Diffie-Hellman Protocol
Abstract
:1. Introduction
Related Literature
2. The Suggested Protocol
Algorithm 1: The suggested key agreement protocol. |
Core Function
3. Security Aspects
- If the transcendental x is distributed via a secure channel, why not use this number directly as the encryption key?
- In computers, numbers are always finite—transcendental numbers with infinite extent are not possible, but rather floating point numbers with a finite extent are used as an approximation of the exact numbers. In what way does this use of finite floating point non-integers differ from the methods based on large integers?
3.1. One or Two Layers of Security
3.2. Comments about the Initial Transcendental Number
3.3. Choices of the Secret Integers
4. Attacks and Countermeasures
Algorithm 2: Schematic description of the Naïve attack. |
4.1. Resilience against Quantum Computer
4.2. Computation Complexity
5. An Example
6. Conclusions
Funding
Acknowledgments
Conflicts of Interest
Appendix A
References
- Diffie, W.; Hellman, M. New Directions in Cryptography. IEEE Trans. Inf. Theory 1976, 22, 644–655. [Google Scholar] [CrossRef] [Green Version]
- Gupta, D.; Biswas, G. On Securing Bi- and Tri-partite Session Key Agreement Protocol Using IBE Framework. Wirel. Pers. Commun. 2017, 96, 4505–4524. [Google Scholar] [CrossRef]
- Goldwasser, S. New Directions in Cryptography: Twenty Some Years Later. In Proceedings of the 38th Annual Symposium on Foundations of Computer Science, Miami Beach, FL, USA, 20–22 October 1997; pp. 314–324. [Google Scholar]
- Shor, P. Polynomial-time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM J. Comput. 1997, 25, 1484–1509. [Google Scholar] [CrossRef] [Green Version]
- Hoffstein, J.; Pipher, J.; Silverman, J. NTRU: A Ring-based Public Key Cryptosystem. In Algorithmic Number Theory, Third International Symposium ANTS-III; Springer: Berlin/Heidelberg, Germany, 1998; pp. 267–288. [Google Scholar]
- Hoffstein, J.; Pipher, J.; Silverman, J. NSS: An NTRU Lattice-based Signature Scheme. In Advance in Cryptology—EUROCRYPT 2001, International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2001; pp. 211–228. [Google Scholar]
- Lei, X.; Liao, X. NTRU-KE: A Lattice-based Public Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2013, 2013, 718. [Google Scholar]
- Gupta, D.; Biswas, G.; Nandan, R. Security Weakness of a Lattice-based Key Exchange Protocol. In Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology, Dhanbad, India, 15–17 March 2018; pp. 1–5. [Google Scholar]
- Singh, S.; Padhye, S. MaTRU-KE: A Key Exchange Protocol Based on MaTRU cryptosystem. Int. J. Commun. Syst. 2019, 32, e3886. [Google Scholar] [CrossRef]
- Akleylek, S.; Kaya, N. New Quantum Secure Key Exchange Protocols Based on MaTRU. In Proceedings of the 2018 6th International Symposium on Digital Forensic and Security, Antalya, Turkey, 22–25 March 2018; pp. 260–264. [Google Scholar]
- Jalali, A.; Azarderakhsh, R.; Kermani, M.; Jao, D. Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit RAM. IEEE Trans. Dependable Secur. Comput. 2019, 16, 902–912. [Google Scholar] [CrossRef]
- Li, X.; Leung, L.; Kwan, A.; Zhang, X.; Kahanda, D.; Anshel, M. Post-Quantum Diffie-Hellman and Symmetric Key Exchange Protocols. In Proceedings of the 2006 IEEE Information Assurance Workshop, West Point, NY, USA, 21–23 June 2006; p. 382. [Google Scholar]
- Miller, F. Telegraphic Code to Insure Privacy and Secrecy in the Transmission of Telegrams; CM Cornwell: New York, NY, USA, 1882. [Google Scholar]
- Dworkin, M.; Barker, E.; Nechvatal, J.; Foti, J.; Bassham, L.; Roback, E.; Dray, J., Jr. Advanced Encryption Standard (AES); Technical Report, Federal Inf. Process. Stds. (NIST FIPS)-197; NIST: Gaithersburg, MD, USA, 2001. [Google Scholar]
- Granlund, T. GNU MP—The GNU Multiple Precision Arithmetic Library, 6.1.2 ed.; Free Sofware Foundation Inc.: Boston, MA, USA, 2016. [Google Scholar]
- Wiebe, N.; Kluchnikov, V. Floating Point Representations in Quantum Circuit Synthesis. arXiv 2013, arXiv:1305.5528v3. [Google Scholar] [CrossRef]
- Feller, W. An Introduction to Probability Theory and Its Applications, 2nd ed.; John Wiley and Sons: Hoboken, NJ, USA, 1950. [Google Scholar]
© 2020 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Järpe, E. An Alternative Diffie-Hellman Protocol. Cryptography 2020, 4, 5. https://doi.org/10.3390/cryptography4010005
Järpe E. An Alternative Diffie-Hellman Protocol. Cryptography. 2020; 4(1):5. https://doi.org/10.3390/cryptography4010005
Chicago/Turabian StyleJärpe, Eric. 2020. "An Alternative Diffie-Hellman Protocol" Cryptography 4, no. 1: 5. https://doi.org/10.3390/cryptography4010005
APA StyleJärpe, E. (2020). An Alternative Diffie-Hellman Protocol. Cryptography, 4(1), 5. https://doi.org/10.3390/cryptography4010005