Next Article in Journal
QUARC: Quantum Research Cubesat—A Constellation for Quantum Communication
Previous Article in Journal
Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically Clone-Resistant Identities
Open AccessArticle

An Alternative Diffie-Hellman Protocol

Department of Intelligent Systems and Digital Design, Halmstad University, 301 18 Halmstad, Sweden
Cryptography 2020, 4(1), 5; https://doi.org/10.3390/cryptography4010005
Received: 24 November 2019 / Revised: 15 February 2020 / Accepted: 21 February 2020 / Published: 25 February 2020
(This article belongs to the Special Issue Cryptographic Protocols 2020)
The Diffie–Hellman protocol, ingenious in its simplicity, is still the major solution in protocols for generating a shared secret in cryptography for e-trading and many other applications after an impressive number of decades. However, lately, the threat from a future quantum computer has prompted successors resilient to quantum computer-based attacks. Here, an algorithm similar to Diffie–Hellman is presented. In contrast to the classic Diffie–Hellman, it involves floating point numbers of arbitrary size in the generation of a shared secret. This can, in turn, be used for encrypted communication based on symmetric cyphers. The validity of the algorithm is verified by proving that a vital part of the algorithm satisfies a one-way property. The decimal part is deployed for the one-way function in a way that makes the protocol a post-quantum key generation procedure. This is concluded from the fact that there is, as of yet, no quantum computer algorithm reverse engineering the one-way function. An example illustrating the use of the protocol in combination with XOR encryption is given. View Full-Text
Keywords: encryption key generation protocol; key exchange; shared secret; decimal part; one-way function; real numbers encryption key generation protocol; key exchange; shared secret; decimal part; one-way function; real numbers
MDPI and ACS Style

Järpe, E. An Alternative Diffie-Hellman Protocol. Cryptography 2020, 4, 5.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop