DSpace
 

EMU I-REP >
02 Faculty of Engineering >
Department of Computer Engineering >
Theses (Master's and Ph.D) – Computer Engineering >

Please use this identifier to cite or link to this item: http://hdl.handle.net/11129/120

Title: Development of Matrix Cipher Modifications and Key Exchange Protocol
Authors: Mahmoud, Ahmed Yehya Ahmed
Keywords: Computer Engineering
Computer security - Cryptography
Matrix Cipher - Dynamic Key - Image Encryption - Diffie-Hellman Key exchange Protocol
Secure Key-exchange Protocol - ElGamal Public Key Cryptosystem
Issue Date: 2012
Publisher: Eastern Mediterranean University (EMU)
Citation: Mahmoud, Ahmed Yehya Ahmed. (2012). Development of Matrix Cipher Modifications and Key Exchange Protocol. Thesis (Ph.D.), Eastern Mediterranean University, Institute of Graduate Studies and Research, Dept. of Computer Engineering, Famagusta: North Cyprus.
Abstract: In modern cryptographic methods, keys are the basis for secure communication channels and the establishment of secret keys is a challenging problem for the large-scale deployment of symmetric cryptography to control encryption and decryption. Key establishment protocols provide exchanging secret information between two or more parties, typically for subsequent use as symmetric keys for a variety of information security services including encryption, message authentication, and entity authentication. They may be broadly subdivided into key transport and key exchange. Notably, key exchange is one of the difficulties when using symmetric algorithms, the key exchange particularly useful from a security viewpoint, for each of the key-sharing parties can have its own control and a high confidence on the quality of the key output. Beside encryption, key exchange is one of the most basic problems in cryptography; it becomes another challenge in cryptography. This thesis is concerned with the modifications of the Hill cipher (HC), extension of Diffie Hellman and ElGamal key exchange protocols. The HC is one of the most popular symmetric key algorithms; it is resistant to brute-force and statistical attacks, but it can be broken with a known plaintext-ciphertext attack (KPCA). To overcome this vulnerability, several researchers tried to propose modifications of the Hill cipher and make it secure. However in the literature, most of these modifications are found to be either insecure or ineffective for image encryption. The Diffie-Hellman Key Exchange (DH) is known as one of the public key algorithms, its aim is to distribute the keys over insecure channels. It is based on the iv complexity of discrete logarithm problem (DLP) solving over a finite fieldGF(p) , where p is prime which considered as an advantage from the security viewpoint due to the challenging and difficulties for solving the discrete logarithm. But DH has drawbacks including the fact that there are heavy and expensive exponential operations in both sides (sender and receiver) which affect its efficiency; it can be used for exchanging secret keys. To overcome this drawback, DH protocol matrix oriented modifications based on DLP are proposed by several researchers. Moreover, in the literatures, most of the modifications still rely on the DLP. The ElGamal Public Key Cryptosystem and Signature (EPKCS) also rely on the computational complexity of finding discrete logarithms based on some publicly known primitive root (base element), GF(p) , where p is a large prime. Similar to DH protocol, the EPKCS has a drawback; it has a slow speed especially for signing in addition to the ciphertext is twice as long as the plaintext. In this thesis, we proposed two modifications of the Hill cipher, HCM-EE and HCM-PRE. A matrix-based Diffie-Hellman-like key exchange protocol is also proposed. ElGamal public key cryptosystem and signature scheme is extended to the group GU(m, p, n) of numbers co-prime to mpn.
Description: Doctor of Philosophy in Computer Engineering. Thesis (Ph.D.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of Computer Engineering, 2012. Supervisor: Assoc. Prof. Dr. Alexander Chefranov.
URI: http://hdl.handle.net/11129/120
Appears in Collections:Theses (Master's and Ph.D) – Computer Engineering

Files in This Item:

File Description SizeFormat
Mahmoud.pdf1.98 MBAdobe PDFView/Open


This item is protected by original copyright

Recommend this item
View Statistics

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

 

Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback