Key Exchange

A New Lightweight Key Exchange Protocol Based on T-tensor Product

Needs

Protocol provides a secure and lightweight solution for communication security in the hardware-limited station.

Differentiation

Benefits

Efficiency

Less time of calculation

Reduce the calculation cost

Increase the size of the exchange matrix

Reduces the communication cost of parties

Increase the energy consumption and occupation of certain computing resources.

Security of protocols in sufficient

Ensure secure communication.

Restriction of the matrix dimension

Communication cost

Calculation cost

Break the dimensions restriction of key exchange protocol

Very suitable for a limited hardware environment

A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes

Needs

Solution: QR Codes

Differentiation

Benefits

Threats of eavesdropping and Man-In-The-Middle (MITM) attacks in secret sharing and secure communication between two remote parties

A secure end-to-end key exchange mechanism between two remote parties by cooperation of multiple devices at each party using QR

Can survive eavesdropping, MITM attacks and brute-force attacks

will not be leaked during the exchange process.

The first alternative approach using two different type of networks with two different devices for the shared key transmission

Involving ciphered QR code exchanges in the key exchange process between two remote parties

A Public Key Encryption System Derived from the Pascal Parallelogram

Needs

Solution: Pascal Knapsack Method

Differentiation

Benefits

Difficulty of communicating the private key to all participants in the network.

Many proposed cryptosystems based on the classic subset sum knapsack problem were insecure

The public keys can vary, but key sizes of a few hundred bits will provide strong security.

Dividing the key into two parts, one of which is made public. The remaining part need never be transmitted beyond the creator of the key

Improves on security and computation time

Provides a reasonable alternative to the most common public-key cryptosystem

An Efficient and Secure Key Exchange Protocol Based on Elliptic Curve and Security Models

Benefits

Needs

Differentiation

Keeping the data sent through the global network secure and far away from hackers

Solution: Elliptic Curve-Diffie Hellman

Provides desirable security properties as compared with the related works.

Protocol generates the session keys based on both the static and the ephemeral keys

we configured our system such that the session key is changed each one minute that increases the number of hashing and Point Multiplication

An enhanced multiple sessions key which is based on ECDH

The proposed protocol generates multiple common keys per session

A New Technique for Diffie-Hillman Key Exchange Protocol Security using Random Image Generation

Needs

Solution: random image generation

Differentiation

Benefits

Random image generation(NxN),

Random key generation from step1.

Key Exchange method

Apply the RSA algorithm

Generate a random color image for each encryption, then uses an image generated to extract keys by applying the XOR function

New problems, such as intrusion, hacking and other security problems

other method had a high chance to know the keys by an attacke

Black and white solution was easy to implement and cost-effective

The keys generated from an image is more secure from Pseudo-Random numbers

Structure of this method is more straightforward as well it uses the image as an intermediate to generate the keys

Reasonable speed of image generation

Time that needed to generate any size of the random image is small