An Approach Towards Encrypting Paired Digits Using Dynamic Programming and Diffie-Hellman Key Exchange

Cryptography has gone through tremendous evolution in recent years. But the concept of enciphering text was started in 1900 BC. There have been many modifications to older cryptography as well as profound discoveries have been made in this field. Likewise, this paper proposes a cryptographic technique that uses the idea of the Diffie-Hellman key Exchange to share a common key. This key-value behaves as a seed value in the formation of key sequences. A methodology has been proposed to encrypt paired digits using dynamic programming. Based on the shared common key, a table is generated on both sides of the sender and receiver to have a common data set. This data set helps in encryption and decryption both. The dynamic table uses the Fibonacci series and recursive functions to fill the table. Decryption needs searching operation in the receiver’s table which would search for (x, y) pair. This (x, y) pair is concatenated to produce plain text.

[1]  Nissa Mehibel,et al.  A new approach of elliptic curve Diffie-Hellman key exchange , 2017, 2017 5th International Conference on Electrical Engineering - Boumerdes (ICEE-B).

[2]  Abdul Meizar,et al.  Key Management Using Combination of Diffie–Hellman Key Exchange with AES Encryption , 2018, 2018 6th International Conference on Cyber and IT Service Management (CITSM).

[3]  Maninder Singh,et al.  Analysis of RSA algorithm using GPU programming , 2014, ArXiv.

[4]  Shreyank N. Gowda An advanced Diffie-Hellman approach to image steganography , 2016, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).

[5]  A. F. Horadam,et al.  A Generalized Fibonacci Sequence , 1961 .

[6]  Alo Sen,et al.  Deoxyribonucleic acid (DNA) for a shared secret key cryptosystem with Diffie hellman key sharing technique , 2015, Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT).

[7]  Preetika Joshi,et al.  Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN , 2015, 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[8]  William Stallings,et al.  Cryptography and network security , 1998 .

[9]  Yuesheng Zhu,et al.  An improved Kerberos protocol based on Diffie-Hellman-DSA key exchange , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[10]  Lein Harn,et al.  Integrating Diffie-Hellman key exchange into the digital signature algorithm (DSA) , 2004, IEEE Communications Letters.

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  Sanjay Kumar Jena,et al.  Secure key exchange using enhanced Diffie-Hellman protocol based on string comparison , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[13]  M. K. Ibrahem Modification of Diffie-Hellman key exchange algorithm for Zero knowledge proof , 2012, 2012 International Conference on Future Communication Networks.

[14]  Hüseyin Bodur,et al.  Implementing Diffie-Hellman key exchange method on logical key hierarchy for secure broadcast transmission , 2017, 2017 9th International Conference on Computational Intelligence and Communication Networks (CICN).

[15]  Ronald L. Rivest,et al.  Introduction to Algorithms, third edition , 2009 .

[16]  Amrita Vishwa,et al.  Experimental study of Diffie-Hellman key exchange algorithm on embedded devices , 2017, 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).