Please enable JavaScript.
Coggle requires JavaScript to display documents.
Key Exchange - Coggle Diagram
Key Exchange
A New Lightweight Key Exchange Protocol Based on T-tensor Product
Needs
Restriction of the matrix dimension
Communication cost
Calculation cost
Protocol provides a secure and lightweight solution for communication security in the hardware-limited station.
Differentiation
Break the dimensions restriction of key exchange protocol
Very suitable for a limited hardware environment
Benefits
Efficiency
Less time of calculation
Reduce the calculation cost
Increase the size of the exchange matrix
Reduces the communication cost of parties
Increase the energy consumption and occupation of certain computing resources.
Security of protocols in sufficient
Ensure secure communication.
A Secure End-to-End Key Exchange Mechanism by Cooperation of Multiple Devices Using QR Codes
Needs
Threats of eavesdropping and Man-In-The-Middle (MITM) attacks in secret sharing and secure communication between two remote parties
Solution: QR Codes
A secure end-to-end key exchange mechanism between two remote parties by cooperation of multiple devices at each party using QR
Differentiation
The first alternative approach using two different type of networks with two different devices for the shared key transmission
Involving ciphered QR code exchanges in the key exchange process between two remote parties
Benefits
Can survive eavesdropping, MITM attacks and brute-force attacks
will not be leaked during the exchange process.
A Public Key Encryption System Derived from the Pascal Parallelogram
Needs
Difficulty of communicating the private key to all participants in the network.
Many proposed cryptosystems based on the classic subset sum knapsack problem were insecure
The public keys can vary, but key sizes of a few hundred bits will provide strong security.
Solution: Pascal Knapsack Method
Differentiation
Dividing the key into two parts, one of which is made public. The remaining part need never be transmitted beyond the creator of the key
Benefits
Improves on security and computation time
Provides a reasonable alternative to the most common public-key cryptosystem
An Efficient and Secure Key Exchange Protocol Based on Elliptic Curve and Security Models
Benefits
Provides desirable security properties as compared with the related works.
Needs
Keeping the data sent through the global network secure and far away from hackers
Differentiation
Protocol generates the session keys based on both the static and the ephemeral keys
we configured our system such that the session key is changed each one minute that increases the number of hashing and Point Multiplication
Solution: Elliptic Curve-Diffie Hellman
An enhanced multiple sessions key which is based on ECDH
The proposed protocol generates multiple common keys per session
A New Technique for Diffie-Hillman Key Exchange Protocol Security using Random Image Generation
Needs
New problems, such as intrusion, hacking and other security problems
other method had a high chance to know the keys by an attacke
Black and white solution was easy to implement and cost-effective
Solution: random image generation
Generate a random color image for each encryption, then uses an image generated to extract keys by applying the XOR function
Differentiation
Random image generation(NxN),
Random key generation from step1.
Key Exchange method
Apply the RSA algorithm
Benefits
The keys generated from an image is more secure from Pseudo-Random numbers
Structure of this method is more straightforward as well it uses the image as an intermediate to generate the keys
Reasonable speed of image generation
Time that needed to generate any size of the random image is small