A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes

Author(s):  
Yong Jin ◽  
Masahiko Tomoishi
Author(s):  
Sofiane Aissani ◽  
Tarek Fettioune ◽  
Nafaa Maizia ◽  
Mohamed Mohammedi ◽  
Mawloud Omar

Author(s):  
S. Kumar ◽  
M. Girimondo ◽  
A. Weimerskirch ◽  
C. Paar ◽  
A. Patel ◽  
...  

2020 ◽  
Vol 8 (5) ◽  
pp. 5526-5532

Key exchange protocols play a vital role in symmetric key cryptography. The transfer of private key through the secured medium is a challenging task because every day the intruders are evolved and the attacks are increasing constantly. The existing key exchange protocols such as Diffie-Hellman, Elgamal, and MQV, etc. are the old methods and many attacks happened on those protocols. That challenges demanding new protocol or methodology of transferring secret key between the parties. The paper proposes a new, secured, less computational overhead key exchange mechanism using short message service available in the cellular networks. GSM-SMS is a highly established secured channel and the research uses this facility to transfer the key between senders to a receiver of the symmetric key cryptosystem. The private key no need to reveal to third parties or even the receiver because the sender can directly communicate to the decryption system through the mobile SMS. After the decryption process, the secret key will be destroyed immediately. There is no possible attack during the key transfer and loss and error of the communication are very less.


2015 ◽  
Vol 2 (3) ◽  
pp. e3
Author(s):  
Daouda Ahmat ◽  
Damien Magoni ◽  
Tegawendé F. Bissyandé

Sign in / Sign up

Export Citation Format

Share Document