scholarly journals Two-sources randomness extractors in finite fields and in elliptic curves

2017 ◽  
Vol Volume 24 - 2017 - Special... ◽  
Author(s):  
Hortense Boudjou Tchapgnouo ◽  
Abdoul A. Ciss ◽  
Djiby Sow ◽  
D.T. Kolyang

We propose two-sources randomness extractors over finite fields and on elliptic curves that can extract from two sources of information without consideration of other assumptions that the starting algorithmic assumptions with a competitive level of security. These functions have several applications. We propose here a description of a version of a Diffie-Hellman key exchange protocol and key extraction. Nous proposons des extracteurs d'aléas 2-sources sur les corps finis et sur les courbes elliptiques capables d'extraire à partir de plusieurs sources d'informations sans considération d'autres hypothèses que les hypothèses algorithmiques de départ avec un niveau de sécurité compétitif. Ces fonctions possèdent plusieurs applications. Nous proposons ici une version du protocole d'échange de clé Diffie-Hellman incluant la phase d'extraction.

2018 ◽  
Vol 67 (11) ◽  
pp. 1622-1636 ◽  
Author(s):  
Armando Faz-Hernandez ◽  
Julio Lopez ◽  
Eduardo Ochoa-Jimenez ◽  
Francisco Rodriguez-Henriquez

2021 ◽  
Author(s):  
Daniel Cervantes‐Vázquez ◽  
Eduardo Ochoa‐Jiménez ◽  
Francisco Rodríguez‐Henríquez

2022 ◽  
Vol 2161 (1) ◽  
pp. 012014
Author(s):  
Chiradeep Gupta ◽  
N V Subba Reddy

Abstract Cryptography is related and referred to as the secured transmission of messages amongst the sender and the intended receiver by ensuring confidentiality, integrity, and authentication. Diffie – Hellman (DH) key exchange protocol is a well-known algorithm that would generate a shared secret key among the sender and the intended receiver, and the basis of cryptosystems for using public and private key for encryption and decryption process. But it is severely affected by the Man in the Middle (MITM) attack that would intercept and manipulate thus eavesdropping the shared secret key. This paper proposes a model of integrating the public-key RSA cryptography system with the DH key exchange to prevent the MITM attack. The performance of the proposed work has been compared to the DH Key Exchange algorithm as well as RSA Cryptosystem to conclude for effectiveness of the proposed model.


Sign in / Sign up

Export Citation Format

Share Document