Security

Use of Hamiltonian Cycles in Cryptograph

Download Now Free registration required

Executive Summary

In cryptography, key distribution is always an important issue in establishing a symmetric key. The famous method of exchanging keys, Diffie-Hellman key exchange, is also vulnerable to a man-in-the-middle attack. Therefore, many protocols are proposed to secure the exchange such as the authenticated D-H key agreement protocol, Station-To-Station (STS) protocol and Secure Socket Layer/Transport Layer Security (SSL/TLS) protocol. With these protocols, the authors propose a novel protocol based on the Hamiltonian cycle problem which is NP-complete. The novel protocol can make key agreement in one step, moreover, make a intermediate useless to an adversary.

  • Format: PDF
  • Size: 400.83 KB