Key exchange based on Diffie-Hellman protocol and image registration

Nowadays, with the advences in ICT and rapid development of mobile internet; media information shared on the various communication networks requires the existence of adequate security measures. Cryptography becoming an effective way to meet these requirements and for maintain the confidentiality. Ho...

Full description

Saved in:
Bibliographic Details
Main Authors: Rimani, Rachid (Author), Hadj Said, Naima (Author), Ali Pacha, Adda (Author), Ozer, Ozen (Author)
Other Authors: USTOMB University (Contributor), LACOSY Laboratory (Contributor), MUSTAPHA STAMBOULI University (Contributor)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2021-03-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02268 am a22003493u 4500
001 ijeecs22848_14749
042 |a dc 
100 1 0 |a Rimani, Rachid  |e author 
100 1 0 |a USTOMB University  |e contributor 
100 1 0 |a LACOSY Laboratory  |e contributor 
100 1 0 |a MUSTAPHA STAMBOULI University  |e contributor 
700 1 0 |a Hadj Said, Naima  |e author 
700 1 0 |a Ali Pacha, Adda  |e author 
700 1 0 |a Ozer, Ozen  |e author 
245 0 0 |a Key exchange based on Diffie-Hellman protocol and image registration 
260 |b Institute of Advanced Engineering and Science,   |c 2021-03-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/22848 
520 |a Nowadays, with the advences in ICT and rapid development of mobile internet; media information shared on the various communication networks requires the existence of adequate security measures. Cryptography becoming an effective way to meet these requirements and for maintain the confidentiality. However, communicating with encrypted messages requires secret key exchange, which is a part of a complex protocol. In this paper, we propose a new method for exchanging key based on Diffie-Hellman protocol and image registration with fast fourier transform, the principle of this method consists to concealing the key in a set of transformed images. Therefore, image registration allows finding transformations between images, which become a tool for recovering the key by the receiver. 
540 |a Copyright (c) 2021 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc/4.0 
546 |a eng 
690 |a PhD student 
690 |a Concealing the key; Diffie-Hellman; Image registration; Key exchange protocol; Transformed images 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 21, No 3: March 2021; 1751-1758 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v21.i3 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/22848/14749 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/22848/14749  |z Get fulltext