Secure Shell (SSH) Key Exchange Method Using Curve25519 and Curve448

2020 ◽  
Author(s):  
A. Adamantiadis ◽  
S. Josefsson ◽  
M. Baushke
2021 ◽  
Vol 17 (2) ◽  
Author(s):  
Rizka Reza Pahlevi ◽  
Parman Sukarno ◽  
Bayu Erfianto

Replay and eavesdropping attacks threaten the information security that is held by smart healthcare devices. An authenticated key exchange method to provide cryptography sessions is the best way to provide information security and secure authentication. However, smart healthcare devices do not have sufficient computation to perform heavy cryptography processes due to the limitations of the embedded devices used. We propose an authenticated key exchange protocol based on a physical unclonable function (PUF). The proposed protocol aimed to countermeasure from replay and eavesdropping attacks. We designed our protocol with one handshake process and three authentication processes. We evaluated our proposed protocol using Tamarin Prover. From the results of the evaluation, our proposed protocol can exchange properties correctly between communication actors and is valid in proving each lemma in eavesdropping and replay attacks.


2018 ◽  
Vol 2 (1) ◽  
Author(s):  
Dyas Yudi Prianggodo

On lately appeared a whole range of applications Android-based Police Report maintained by the Polres each region.The Police Report on the application of the data that is sent plain text.It is dangerous because it allows hackers or unauthorized persons can read or change information that report.To secure the data report on applications Android-based Police Report writer uses the concept of merging cryptographic algorithms Blowfish and key exchange method Diffie-Hellman for encryption of data transmitted at the time of report.Implementation of the Blowfish algorithm and Diffie-Hellman algorithms on Android-based applications use memory is nothing more than a memory allocation provided by the Android operating system.


2018 ◽  
Vol 2 (1) ◽  
Author(s):  
Dyas Yudi Priyanggodo

On lately appeared a whole range of applications Android-based Police Report maintained by the Polres each region.The Police Report on the application of the data that is sent plain text.It is dangerous because it allows hackers or unauthorized persons can read or change information that report.To secure the data report on applications Android-based Police Report writer uses the concept of merging cryptographic algorithms Blowfish and key exchange method Diffie-Hellman for encryption of data transmitted at the time of report.Implementation of the Blowfish algorithm and Diffie-Hellman algorithms on Android-based applications use memory is nothing more than a memory allocation provided by the Android operating system.


Sign in / Sign up

Export Citation Format

Share Document