Digital Repository

Prevent Man-in-the-Middle Attack in Diffie Hellman Key Exchange

Show simple item record

dc.contributor.author Manathunga, Dasun
dc.date.accessioned 2024-02-19T08:07:48Z
dc.date.available 2024-02-19T08:07:48Z
dc.date.issued 2023
dc.identifier.citation Manathunga, Dasun (2023) Prevent Man-in-the-Middle Attack in Diffie Hellman Key Exchange. MSc. Dissertation, Informatics Institute of Technology en_US
dc.identifier.issn 20210072
dc.identifier.uri http://dlib.iit.ac.lk/xmlui/handle/123456789/1722
dc.description.abstract "When communication starts over the network, there are two parties involve. In order to start communication they need to have a secure communication. In order to establish a communication people use Diffie Hellman key change protocol. When using this protocol the both parties will come up with a common secret key. But this key only know those two parties. By using this security key they can encrypt their messages and continue the communication. The real world problem is, this mechanism has a vulnerability to man in the middle attack. This paper is conducting to prevent this vulnerability. As explain in previous paragraph, there is a vulnerability in Diffie Hellman key exchange to the man in the middle attack. After conducting literature review and get the deep understanding author has discovered lack of authentication caused this vulnerability. Based on this conclusion author has suggested the conceptual framework which has an authentication functionality in the key exchange level. As a solution, in the initial handshake first person creates hash code based on the information on first handshake. Then second person will store this hash table and continues. Once first person gets the packet, he will check the new hash and his initially stored hash value. If it is same, then communication conclude as secure. If not it is possible that there is a man in the middle. This conceptual framework shred with selected evaluators in order to evaluate the conceptual framework. The agreed on this solution with good approach and also there are some improvements need to be done. Those improvements and answers will discuss in detail evaluation chapter" en_US
dc.language.iso en en_US
dc.publisher IIT en_US
dc.subject Diffie Hellman en_US
dc.subject Cryptography en_US
dc.subject AES algorithm en_US
dc.title Prevent Man-in-the-Middle Attack in Diffie Hellman Key Exchange en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search


Advanced Search

Browse

My Account