DC Field | Value | Language |
dc.contributor.author | MAnsour, ABoubaker | - |
dc.date.accessioned | 2024-05-30T13:44:16Z | - |
dc.date.available | 2024-05-30T13:44:16Z | - |
dc.date.issued | 2023 | - |
dc.identifier.uri | https://repository.esi-sba.dz/jspui/handle/123456789/602 | - |
dc.description | Encadré par: Dr. Amina Souyah | en_US |
dc.description.abstract | One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP)
which is a widely used technique on which key exchange systems around the world
depend. This protocol is simple and uncomplicated, and its robustness is based on the
Discrete Logarithm Problem (DLP). Despite this, the protocol is vulnerable to the
Man-in-the-Middle (MitM) attack. The scope of this thesis is to provide a relevant
review on secure key exchange mechanisms that are employed in practice to deal
with the issue of sharing securely the secret key between the authorized partied in
symmetric cryptosystems.
On the other hand, the practical aspect of this thesis is concerned by the redesign
and realization of a modified version of the DHP protocol. The proposal is based on
two verification stages to withstand the issue of Man-in-the-Middle (MITM) attack.
In the first stage, the pseudo-random value that one of the communicating parties
(sender ) sends to the other legitimate party (the receiver) will be verified weither
there exists any malicious manipulation on it. In the second stage, the random value
that the receiver sends to the sender will be also verified weither there exists any
malicious manipulation on it.
Mathematical proofs have been carried out to demonstrate the effectiveness of our
contribution and its robustness against Man-in-the-Middle (MitM) attack. | en_US |
dc.language.iso | en | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Secret key Exchange | en_US |
dc.subject | Diffie-Hellman Protocol (DHP) | en_US |
dc.subject | Man-In-The-Middle (MitM) Attack | en_US |
dc.title | A Shared Secret Key Diffie-Hellman Protocol enhancements to withstand Man-in-the-Middle Attack | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Ingénieur
|