{"title":"Multi-Resolution Like Data Transmission Security Using Diffie-Hellman Protocol","authors":"H. M. Ahmed, R. W. Jassim","doi":"10.24237/djps.16.01.516b","DOIUrl":null,"url":null,"abstract":"In this paper, special schema has been proposed for long message transmission which has been encrypted in efficient manner that is called (parallel multi-resolution like) encryption approach, that means multiple levels or sub-image represented in a matrix contains data of long message, each level of this matrix related with classical encryption methods with a secret keys that generated by (Diffie–Hellman) key exchange protocol that utilized in our cryptosystem. The statistical analysis that applied on encrypted data indicates that cipher text passed in each statistical test. Moreover, this cryptosystem removed an important problem which is (Man in the middle attack) in that protocol and (Brute force attack). Then efficiency of data transfer security has been increased when using the hash function (SHA256) and separating number of characters, the proposed method has improved the mechanism of protocol (D-H), making it possible to send long messages more confidentially.","PeriodicalId":11231,"journal":{"name":"Diyala Journal for Pure Science","volume":"38 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Diyala Journal for Pure Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24237/djps.16.01.516b","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In this paper, special schema has been proposed for long message transmission which has been encrypted in efficient manner that is called (parallel multi-resolution like) encryption approach, that means multiple levels or sub-image represented in a matrix contains data of long message, each level of this matrix related with classical encryption methods with a secret keys that generated by (Diffie–Hellman) key exchange protocol that utilized in our cryptosystem. The statistical analysis that applied on encrypted data indicates that cipher text passed in each statistical test. Moreover, this cryptosystem removed an important problem which is (Man in the middle attack) in that protocol and (Brute force attack). Then efficiency of data transfer security has been increased when using the hash function (SHA256) and separating number of characters, the proposed method has improved the mechanism of protocol (D-H), making it possible to send long messages more confidentially.