Abstract
One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a widely used technique on which key exchange systems around the world depend. This protocol is simple and uncomplicated, and its robustness is based on the Discrete Logarithm Problem (DLP). Despite this, he is considered weak against the man-in-the-middle attack. This article presents a completely different version of the DHP protocol. The proposed version is based on two verification stages. In the first step, we check if the pseudo-random value α that Alice sends to Bob has been manipulated! In the second step, we make sure that the random value β that Bob sends to Alice is not manipulated. The man-in-the-middle attacker, Eve, can impersonate neither Alice nor Bob, manipulate their exchanged values, or discover the secret encryption key.
Cite
CITATION STYLE
Kara, M., Laouid, A., AlShaikh, M., Bounceur, A., & Hammoudeh, M. (2021). Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol. Jurnal Ilmiah Teknik Elektro Komputer Dan Informatika, 7(3), 380. https://doi.org/10.26555/jiteki.v7i3.22210
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.