Developed Protocol for Key Exchange Based on Irreducible Polynomial
The Aim of this paper is to design a protocol for key exchanging to work on the available computers for different data security application. This paper proposed idea to modify the Diffie-Hellman key exchange by using truncated polynomial instead of discrete logarithm problem to overcome the problem...
| Published in: | مجلة جامعة الانبار للعلوم الصرفة |
|---|---|
| Main Authors: | Abdul Monem S. Rahma, Rabah N. Farhan, Hussam J. Mohammad |
| Format: | Article |
| Language: | English |
| Published: |
University of Anbar
2012-06-01
|
| Subjects: | |
| Online Access: | https://juaps.uoanbar.edu.iq/article_44312_5b618c72893a8d0804c28a3d5bea2248.pdf |
Similar Items
Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial
by: Hala B. Abdul Wahab, et al.
Published: (2016-06-01)
by: Hala B. Abdul Wahab, et al.
Published: (2016-06-01)
D(HE)at: A Practical Denial-of-Service Attack on the Finite Field Diffie–Hellman Key Exchange
by: Szilard Pfeiffer, et al.
Published: (2024-01-01)
by: Szilard Pfeiffer, et al.
Published: (2024-01-01)
Diffie-Hellman Key Exchange through Steganographied Images
by: Amine Khaldi
Published: (2018-05-01)
by: Amine Khaldi
Published: (2018-05-01)
Proposal to Complex DES Security Using Diffie Hellman Injection
by: Shatha habeeb Jafar
Published: (2011-04-01)
by: Shatha habeeb Jafar
Published: (2011-04-01)
Modified the RC4 Stream Cipher Algorithm Based on Irreducible Polynomial
by: Zainab Mohammed Hussein, et al.
Published: (2015-04-01)
by: Zainab Mohammed Hussein, et al.
Published: (2015-04-01)
An image encryption method based on modified elliptic curve Diffie-Hellman key exchange protocol and Hill Cipher
by: Hadi Hiba Hilal, et al.
Published: (2024-03-01)
by: Hadi Hiba Hilal, et al.
Published: (2024-03-01)
Triple receiver public key encryption cryptosystem
by: Liutao ZHAO, et al.
Published: (2020-12-01)
by: Liutao ZHAO, et al.
Published: (2020-12-01)
Triple receiver public key encryption cryptosystem
by: ZHAO Liutao, WANG Caiqun, et al.
Published: (2020-12-01)
by: ZHAO Liutao, WANG Caiqun, et al.
Published: (2020-12-01)
Public Key Cipher with Signature Based on Diffie-Hellman and the Magic Square Problem
by: Abdul S.Rahma, et al.
Published: (2016-01-01)
by: Abdul S.Rahma, et al.
Published: (2016-01-01)
A Secure Medical Image Transmission System Based On 2D Logistic Map and Diffie-Hellman Key Exchange Mechanisms
by: Shakhawan H. Wady, et al.
Published: (2022-10-01)
by: Shakhawan H. Wady, et al.
Published: (2022-10-01)
BCDH: Blockchain-based covert Diffie-Hellman key exchange scheme
by: Qinghua Hu, et al.
Published: (2025-10-01)
by: Qinghua Hu, et al.
Published: (2025-10-01)
Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Cai-fen WANG, et al.
Published: (2017-10-01)
by: Cai-fen WANG, et al.
Published: (2017-10-01)
Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Cai-fen WANG, et al.
Published: (2017-10-01)
by: Cai-fen WANG, et al.
Published: (2017-10-01)
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols
by: FENG Chao, et al.
Published: (2011-01-01)
by: FENG Chao, et al.
Published: (2011-01-01)
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols
by: FENG Chao, et al.
Published: (2011-01-01)
by: FENG Chao, et al.
Published: (2011-01-01)
Irreducibility Criteria for Compositions and Multiplicative Convolutions of Polynomials with Integer Coefficients
by: Bonciocat Anca Iuliana, et al.
Published: (2014-12-01)
by: Bonciocat Anca Iuliana, et al.
Published: (2014-12-01)
An Improved Key Agreement Protocol Based on Fractal Theory
by: Nadia M. G. Al-Saidi
Published: (2014-01-01)
by: Nadia M. G. Al-Saidi
Published: (2014-01-01)
A METHOD FOR OBTAINING SECURE AND EFFICIENT GROUP KEY OVER WIRELESS AD-HOC NETWORKS BASED ON A VIRTUAL SUBNET MODEL
by: PJ A Alphonse, et al.
Published: (2021-03-01)
by: PJ A Alphonse, et al.
Published: (2021-03-01)
Secure cross-layer routing protocol with authentication key management scheme for manets
by: G.R. Rama Devi, et al.
Published: (2023-10-01)
by: G.R. Rama Devi, et al.
Published: (2023-10-01)
Modified Cyclotomic Polynomial and Its Irreducibility
by: Ki-Suk Lee, et al.
Published: (2020-03-01)
by: Ki-Suk Lee, et al.
Published: (2020-03-01)
ON THE SECURITY OF GENERALIZED MULTILINEAR MAPS BASED ON WEIL PAIRING
by: Annisa Dini Handayani, et al.
Published: (2025-04-01)
by: Annisa Dini Handayani, et al.
Published: (2025-04-01)
ADDING PERFECT FORWARD SECRECY TO KERBEROS
by: Wameedh Nazar Flayyih
Published: (2010-04-01)
by: Wameedh Nazar Flayyih
Published: (2010-04-01)
Hierarchical certificateless authenticated key agreement protocol
by: Hang SU, et al.
Published: (2016-07-01)
by: Hang SU, et al.
Published: (2016-07-01)
Hierarchical certificateless authenticated key agreement protocol
by: Hang SU, et al.
Published: (2016-07-01)
by: Hang SU, et al.
Published: (2016-07-01)
Characterization of irreducible polynomials over a special principal ideal ring
by: Brahim Boudine
Published: (2023-12-01)
by: Brahim Boudine
Published: (2023-12-01)
Distribution of constant terms of irreducible polynomials in ℤₚ[x] whose degree is a product of two distinct odd primes
by: Sarah C. Cobb, et al.
Published: (2024-03-01)
by: Sarah C. Cobb, et al.
Published: (2024-03-01)
New sequences from the generalized Pell p−numbers and mersenne numbers and their application in cryptography
by: Elahe Mehraban, et al.
Published: (2024-04-01)
by: Elahe Mehraban, et al.
Published: (2024-04-01)
Proxy Re-Encryption Scheme Supporting Keyword Search in Email System
by: NIU Shufen, CHEN Lixia, LIU Wenke, WANG Caifen, DU Xiaoni
Published: (2020-06-01)
by: NIU Shufen, CHEN Lixia, LIU Wenke, WANG Caifen, DU Xiaoni
Published: (2020-06-01)
Improved Framework for Blockchain Application Using Lattice Based Key Agreement Protocol
by: Zahraa Ch. Oleiwi, et al.
Published: (2023-03-01)
by: Zahraa Ch. Oleiwi, et al.
Published: (2023-03-01)
Nearly irreducibility of polynomials and the Newton diagrams
by: Mateusz Masternak
Published: (2020-01-01)
by: Mateusz Masternak
Published: (2020-01-01)
Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro
by: Safwan Mawlood Hussein, et al.
Published: (2020-04-01)
by: Safwan Mawlood Hussein, et al.
Published: (2020-04-01)
SIDH Hybrid Schemes with Classical Component Based on the Discrete Logarithm Problem over Finite Field Extension
by: Michał Wroński, et al.
Published: (2020-09-01)
by: Michał Wroński, et al.
Published: (2020-09-01)
Classification and irreducibility of a class of integer polynomials
by: Chen Yizhi, et al.
Published: (2025-06-01)
by: Chen Yizhi, et al.
Published: (2025-06-01)
Dlog is Practically as Hard (or Easy) as DH – Solving Dlogs via DH Oracles on EC Standards
by: Alexander May, et al.
Published: (2023-08-01)
by: Alexander May, et al.
Published: (2023-08-01)
Smart grid environment using block chain-based key agreements
by: Wei Liu, et al.
Published: (2024-02-01)
by: Wei Liu, et al.
Published: (2024-02-01)
A modified Matrices Approach in Advanced Encryption Standard Algorithm
by: Abdul Monem Rahma, et al.
Published: (2019-10-01)
by: Abdul Monem Rahma, et al.
Published: (2019-10-01)
APPLICATION OF LAMPORT DIGITAL SIGNATURE SCHEME INTO THE STATION-TO-STATION PROTOCOL
by: Md Nizam Udin, et al.
Published: (2022-10-01)
by: Md Nizam Udin, et al.
Published: (2022-10-01)
A Novel Construction of Perfect Strict Avalanche Criterion S-box using Simple Irreducible Polynomials
by: Alamsyah Alamsyah
Published: (2020-05-01)
by: Alamsyah Alamsyah
Published: (2020-05-01)
FarpScusn: Fully Anonymous Routing Protocol with Self-Healing Capability in Unstable Sensor Networks
by: Fengyin Li, et al.
Published: (2020-11-01)
by: Fengyin Li, et al.
Published: (2020-11-01)
COMPARATIVE ANALYSIS OF MOD-ECDH ALGORITHM WITH VARIOUS ALGORITHMS
by: O Sri Nagesh, et al.
Published: (2020-06-01)
by: O Sri Nagesh, et al.
Published: (2020-06-01)
Similar Items
-
Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial
by: Hala B. Abdul Wahab, et al.
Published: (2016-06-01) -
D(HE)at: A Practical Denial-of-Service Attack on the Finite Field Diffie–Hellman Key Exchange
by: Szilard Pfeiffer, et al.
Published: (2024-01-01) -
Diffie-Hellman Key Exchange through Steganographied Images
by: Amine Khaldi
Published: (2018-05-01) -
Proposal to Complex DES Security Using Diffie Hellman Injection
by: Shatha habeeb Jafar
Published: (2011-04-01) -
Modified the RC4 Stream Cipher Algorithm Based on Irreducible Polynomial
by: Zainab Mohammed Hussein, et al.
Published: (2015-04-01)
