Secure key exchange scheme: A DNA computing-based approach to resist MITM in DHKE

被引:0
|
作者
Sreeja C.S. [1 ]
Misbahuddin M. [2 ]
机构
[1] Department of Computer Science, Christ University, Bengaluru
[2] Computer Networks and Internet Engineering Division, Centre for Development of Advanced Computing, Bengaluru
关键词
DHKE; Diffie-Hellman key exchange; DNA; DNA encryption; DNA-DHKE; Man in the middle attack; MITM;
D O I
10.1504/IJICS.2021.118955
中图分类号
学科分类号
摘要
Diffie-Hellman key exchange (DHKE) protocol was a pioneering work and considered as a new direction in the field of cryptography though it is not an encryption protocol. DHKE is a method to exchange the keys securely, based on the discrete logarithm problem. It has applications in internet security protocols including SSL, IP Sec and SSH. The major issue with DHKE is its vulnerability to man in the middle attack (MITM). Various techniques have been proposed to resist the MITM including digital signatures. This paper proposes DNA computing-based encryption techniques to resist MITM in DHKE. DNA cryptography builds on the concepts of biomolecular computations which are considered as one of the emerging directions in the cryptography. The proposed methodology also includes an encryption technique based on DNA-based codebook, secret sharing and DNA cryptography to exchange parameters securely. The security analysis of the proposed scheme is evaluated by theoretical analysis. Formal analysis of the proposed protocol is done using Scyther and all the modelled claims are validated and positive results are obtained. Copyright © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:307 / 323
页数:16
相关论文
共 50 条
  • [1] A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming
    Huang, Yanyu
    Wang, King-Hang
    Kumari, Saru
    Wu, Mu-En
    ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) : 1200 - 1215
  • [2] A Multiphase Cryptosystem with Secure Key Encapsulation Scheme Based on Principles of DNA Computing
    Fasila, K. A.
    Antony, Deepthy
    2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC), 2014, : 1 - 4
  • [3] DNA computing-based cryptography
    Wang, Xing
    Zhang, Qiang
    2009 FOURTH INTERNATIONAL CONFERENCE ON BIO-INSPIRED COMPUTING: THEORIES AND APPLICATIONS, PROCEEDINGS, 2009, : 67 - 69
  • [4] Secure and Lightweight Vehicular Privacy Preservation Scheme Under Fog Computing-Based IoVs
    Xia, Zhuoqun
    Zeng, Lingxuan
    Gu, Ke
    Su, Chao
    Hu, Hangyu
    Long, Kejun
    IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2024, 9 (02): : 4115 - 4129
  • [5] A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications
    Karnatak, Vijay
    Mishra, Amit Kumar
    Tripathi, Neha
    Wazid, Mohammad
    Singh, Jaskaran
    Das, Ashok Kumar
    SECURITY AND PRIVACY, 2024, 7 (02)
  • [6] Hybrid secure GSM architecture using DNA computing-based hyperelliptic curve cryptography
    Vijayakumar, P.
    Vijayalakshmi, V.
    Zayaraz, G.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (02) : 105 - 118
  • [7] Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks
    Varshney, Gaurav
    Misra, Manoj
    Atrey, Pradeep
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 42 : 1 - 17
  • [8] An improved key exchange protocol for WLAN that can resist MITM attack which benefit from RTT
    Li, Rongsen
    Dou, Wenhua
    Li, R. (rs_li@nudt.edu.cn), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09): : 7357 - 7368
  • [9] Analysis and design of a secure key exchange scheme
    Alvarez, Rafael
    Tortosa, Leandro
    Vicent, Jose-Fco.
    Zamora, Antonio
    INFORMATION SCIENCES, 2009, 179 (12) : 2014 - 2021
  • [10] Secure Key Exchange Scheme for IPTV Broadcasting
    Pippal, Ravi Singh
    Tapaswi, Shashikala
    Jaidhar, C. D.
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2012, 36 (01): : 48 - 53