Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4774
Title: Analysis of El-Gamal with Diffie-Hellman scheme using Hash-function for message security
Authors: Chaudhari, Narendra S.
Keywords: Authentication;Cryptography;Global system for mobile communications;Hash functions;Mobile commerce;Network security;Public key cryptography;Samarium;Diffie-Hellman key exchange;Discrete logarithms;Man-in-middle attacks;Password;Password-based systems;Prime number;Secret key;Wireless mobile systems;Mobile security
Issue Date: 2012
Publisher: IEEE Computer Society
Citation: Saxena, N., & Chaudhari, N. S. (2012). Analysis of el-gamal with diffie-hellman scheme using hash-function for message security. Paper presented at the 2012 Students Conference on Engineering and Systems, SCES 2012, , 2012-January 55-60.
Abstract: The security of SMS is important when a secret code or one-time password is used while send a message from one mobile to another like in m-commerce, m-banking, for bank account details etc. in GSM network. Whenever this kind of data is moved through wireless mobile system, it must be encrypted with one-time password so that even mobile operator couldn't access it. Password based system provides a secure secret key by exchanging the public keys between sender and receiver over the communication channel. This secret key is used to encrypt or decrypt the message. The Diffie-Hellman key exchange scheme and El-Gamal scheme are suitable for this kind of operation to be performed. After exchanging the public keys, sender and receiver both generate the secret key. This key can be used as a secure secret key. In this paper we'll see the key exchange operation by both the schemes. One more property Integrity must be maintained while the data is transferred over the channel or in air. The security of these schemes can be increased by using hash functions. Next, a comparative analysis shows that El-Gamal key exchange with hash function scheme is more secure than Diffie-Hellman key exchange with hash function scheme. At the end, the proposed approach based on both the schemes, is successfully implemented and able to prevent from some attacks like man-in-middle attack, reply attack, message disclosure attack etc. ©2012 IEEE.
URI: https://dspace.iiti.ac.in/handle/123456789/4774
ISBN: 9781467304559
Type of Material: Conference Paper
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: