International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 176 - Number 31 |
Year of Publication: 2020 |
Authors: Avenash Kumar, Sufian Hameed |
10.5120/ijca2020920380 |
Avenash Kumar, Sufian Hameed . Diffie Hellman Stand the Test of Time (Protocol’s Limitations, Applications and Functional Divergence). International Journal of Computer Applications. 176, 31 ( Jun 2020), 1-5. DOI=10.5120/ijca2020920380
Cryptography plays a vital role in protecting secret information, as secure communication between two parties over the internet is the necessity and cannot be overstated. The Diffie-Hellman Key Exchange (DHKE) protocol is the well-known asymmetric algorithm formulated by its namesakes Whitfield Diffie and Martin Hellman in 1976. It allows two parties to securely exchange shared secret over an insecure communication channel, without using any pre-shared secret. However, protocol’s theoretical assumptions and design often associated with some serious security flaws. This motivates cryptographic community to propose different variants of DHKE protocol. The major intend of this research is to examine both empirical and theoretical vulnerabilities of DHKE protocol. Which leads us to determine true rationales behind different variations of DHKE protocol. By reading this manuscript, it is hoped that application security experts will get good understanding of cryptographic primitives. These primitives are important and should be considered when designing or implementing any security protocol such as DHKE.