Document Type : Research Paper

Authors

1 University of Technology- Computer science Dept.

2 University of Anbar - College of Computer.

10.37652/juaps.2011.44312

Abstract

The Aim of this paper is to design a protocol for key exchanging to work on the available
computers for different data security application. This paper proposed idea to modify the Diffie-Hellman key
exchange by using truncated polynomial instead of discrete logarithm problem to overcome the problem of
large prime numbers and non-full coverage of the finite set. The proposed method depends on the arithmetic
polynomials. The Irreducible truncated polynomial mathematics is highly efficient and compatible with
personal computers.

Keywords

Main Subjects

  1. [1] Ran C.  , Hugo K., "Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels" . 2001.
  2. [2] Chandan S., "A Note on Irreducible Polynomials and Identity Testing". 2004.
  3. [3] Ron Brown, Jonathan L. Merzel, "INVARIANTS OF DEFECTLESS IRREDUCIBLE POLYNOMIALS" . 2000 .
  4. [4] Henry W., "Divisibility Properties of Fibonacci Polynomials over GF(2)" , MSc. Thesis, Department of Statistics and Computer Science, West Virginia University ,1997 .
  5. [5] Bhattacharya P., Debbabi M. , Otrok H., " Improving the Diffie Heliman Secure Key Exchange", Computer Security Laboratory Concordia Institute for Information Systems Engineering, Concordia University, Canada, 2005.
  6. [6] Jalaj K. Upadhyay, "Key Exchange Protocol Using Encryption Scheme Provably Secure Against CCA", ISC Turkey, 2007.
  7. [7] Abeer T. Al-Obaidy , " Security Techniques for E-Commerce Websites ", Ph. Thesis, The Department of Computer Science , University of Technology, 2010.
  8. [8] Keith Palmgren, "Diffie-Hellman Key Exchange A Non-mathematician’s explanation", ISSA ,2006.
  9. [9] William Stallings ," Cryptography and Network Security Principles and Practices, Fourth Edition",© by Prentice Hall ,2005.

10. [10] H. K. Pathak , Manju Sanghi, " Public key cryptosystem and a key exchange protocol using tools of non-abelian group", IJCSE, 2010 .

11. [11] B.Lehane ,  L.Doyle, D.O’Mahony, " Shared RSA Key Generation In A Mobile Ad Hoc Network", 2003 .

12. [12] Naim Ajlouni , asim El-sheik ," A new Approach in Key Generation and Expansion in Rijandael Algorithm", The international Arab Journal of Information Technology, 2006 .

13. [13] M. Freire-Santosa, J. Fierrez-Aguilara, J. Ortega-Garcia, " Cryptographic key generation using handwritten signature" , 2006 .