Document Type : Research Paper
Authors
1 University of Technology- Computer science Dept.
2 University of Anbar - College of Computer.
Abstract
The Aim of this paper is to design a protocol for key exchanging to work on the available
computers for different data security application. This paper proposed idea to modify the Diffie-Hellman key
exchange by using truncated polynomial instead of discrete logarithm problem to overcome the problem of
large prime numbers and non-full coverage of the finite set. The proposed method depends on the arithmetic
polynomials. The Irreducible truncated polynomial mathematics is highly efficient and compatible with
personal computers.
Keywords
Main Subjects
- [1] Ran C. , Hugo K., "Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels" . 2001.
- [2] Chandan S., "A Note on Irreducible Polynomials and Identity Testing". 2004.
- [3] Ron Brown, Jonathan L. Merzel, "INVARIANTS OF DEFECTLESS IRREDUCIBLE POLYNOMIALS" . 2000 .
- [4] Henry W., "Divisibility Properties of Fibonacci Polynomials over GF(2)" , MSc. Thesis, Department of Statistics and Computer Science, West Virginia University ,1997 .
- [5] Bhattacharya P., Debbabi M. , Otrok H., " Improving the Diffie Heliman Secure Key Exchange", Computer Security Laboratory Concordia Institute for Information Systems Engineering, Concordia University, Canada, 2005.
- [6] Jalaj K. Upadhyay, "Key Exchange Protocol Using Encryption Scheme Provably Secure Against CCA", ISC Turkey, 2007.
- [7] Abeer T. Al-Obaidy , " Security Techniques for E-Commerce Websites ", Ph. Thesis, The Department of Computer Science , University of Technology, 2010.
- [8] Keith Palmgren, "Diffie-Hellman Key Exchange A Non-mathematician’s explanation", ISSA ,2006.
- [9] William Stallings ," Cryptography and Network Security Principles and Practices, Fourth Edition",© by Prentice Hall ,2005.
10. [10] H. K. Pathak , Manju Sanghi, " Public key cryptosystem and a key exchange protocol using tools of non-abelian group", IJCSE, 2010 .
11. [11] B.Lehane , L.Doyle, D.O’Mahony, " Shared RSA Key Generation In A Mobile Ad Hoc Network", 2003 .
12. [12] Naim Ajlouni , asim El-sheik ," A new Approach in Key Generation and Expansion in Rijandael Algorithm", The international Arab Journal of Information Technology, 2006 .
13. [13] M. Freire-Santosa, J. Fierrez-Aguilara, J. Ortega-Garcia, " Cryptographic key generation using handwritten signature" , 2006 .