Key exchange based on Diffie-Hellman protocol and image registration
Nowadays, with the advences in ICT and rapid development of mobile internet; media information shared on the various communication networks requires the existence of adequate security measures. Cryptography becoming an effective way to meet these requirements and for maintain the confidentiality. Ho...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | , , |
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2021-03-01.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02268 am a22003493u 4500 | ||
---|---|---|---|
001 | ijeecs22848_14749 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Rimani, Rachid |e author |
100 | 1 | 0 | |a USTOMB University |e contributor |
100 | 1 | 0 | |a LACOSY Laboratory |e contributor |
100 | 1 | 0 | |a MUSTAPHA STAMBOULI University |e contributor |
700 | 1 | 0 | |a Hadj Said, Naima |e author |
700 | 1 | 0 | |a Ali Pacha, Adda |e author |
700 | 1 | 0 | |a Ozer, Ozen |e author |
245 | 0 | 0 | |a Key exchange based on Diffie-Hellman protocol and image registration |
260 | |b Institute of Advanced Engineering and Science, |c 2021-03-01. | ||
500 | |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/22848 | ||
520 | |a Nowadays, with the advences in ICT and rapid development of mobile internet; media information shared on the various communication networks requires the existence of adequate security measures. Cryptography becoming an effective way to meet these requirements and for maintain the confidentiality. However, communicating with encrypted messages requires secret key exchange, which is a part of a complex protocol. In this paper, we propose a new method for exchanging key based on Diffie-Hellman protocol and image registration with fast fourier transform, the principle of this method consists to concealing the key in a set of transformed images. Therefore, image registration allows finding transformations between images, which become a tool for recovering the key by the receiver. | ||
540 | |a Copyright (c) 2021 Institute of Advanced Engineering and Science | ||
540 | |a http://creativecommons.org/licenses/by-nc/4.0 | ||
546 | |a eng | ||
690 | |a PhD student | ||
690 | |a Concealing the key; Diffie-Hellman; Image registration; Key exchange protocol; Transformed images | ||
655 | 7 | |a info:eu-repo/semantics/article |2 local | |
655 | 7 | |a info:eu-repo/semantics/publishedVersion |2 local | |
655 | 7 | |2 local | |
786 | 0 | |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 21, No 3: March 2021; 1751-1758 | |
786 | 0 | |n 2502-4760 | |
786 | 0 | |n 2502-4752 | |
786 | 0 | |n 10.11591/ijeecs.v21.i3 | |
787 | 0 | |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/22848/14749 | |
856 | 4 | 1 | |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/22848/14749 |z Get fulltext |