Ahmed El Emine Sejad, K. W. Keita, K. Tall, I. Diop
{"title":"S-SEJAD通过隐写","authors":"Ahmed El Emine Sejad, K. W. Keita, K. Tall, I. Diop","doi":"10.1109/GlobConPT57482.2022.9938339","DOIUrl":null,"url":null,"abstract":"Communication has always been an indispensable means of everyday life. The Diffie-Hellman (DH) model [1] was one of the historical mechanisms that allow two entities to communicate without prior knowledge. DH has known over time several variants dealing with different aspects (security, speed, etc). One of these variants is called S-SEJAD [2], which is a model we proposed to secure key exchange. In this paper, we propose an enhancement to this model in order to be able to unobtrusively share the AES key [3] as well as the p value and g value, which further secure the data exchange process. The obtained results show the performance of our model in terms of time and robustness.","PeriodicalId":431406,"journal":{"name":"2022 IEEE Global Conference on Computing, Power and Communication Technologies (GlobConPT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"S-SEJAD through Steganography\",\"authors\":\"Ahmed El Emine Sejad, K. W. Keita, K. Tall, I. Diop\",\"doi\":\"10.1109/GlobConPT57482.2022.9938339\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Communication has always been an indispensable means of everyday life. The Diffie-Hellman (DH) model [1] was one of the historical mechanisms that allow two entities to communicate without prior knowledge. DH has known over time several variants dealing with different aspects (security, speed, etc). One of these variants is called S-SEJAD [2], which is a model we proposed to secure key exchange. In this paper, we propose an enhancement to this model in order to be able to unobtrusively share the AES key [3] as well as the p value and g value, which further secure the data exchange process. The obtained results show the performance of our model in terms of time and robustness.\",\"PeriodicalId\":431406,\"journal\":{\"name\":\"2022 IEEE Global Conference on Computing, Power and Communication Technologies (GlobConPT)\",\"volume\":\"74 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE Global Conference on Computing, Power and Communication Technologies (GlobConPT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GlobConPT57482.2022.9938339\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Global Conference on Computing, Power and Communication Technologies (GlobConPT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GlobConPT57482.2022.9938339","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Communication has always been an indispensable means of everyday life. The Diffie-Hellman (DH) model [1] was one of the historical mechanisms that allow two entities to communicate without prior knowledge. DH has known over time several variants dealing with different aspects (security, speed, etc). One of these variants is called S-SEJAD [2], which is a model we proposed to secure key exchange. In this paper, we propose an enhancement to this model in order to be able to unobtrusively share the AES key [3] as well as the p value and g value, which further secure the data exchange process. The obtained results show the performance of our model in terms of time and robustness.