Cryptographic key distribution algorithms
pdf

Keywords

cryptographic system, discrete logarithm problem, Diffie-Helmann-Merkel key exchange, Stickel – Shpilrain protocol, man-in-the-middle attack, abelian and non-abelian groups

How to Cite

[1]
L. CHIRIAC, N. JOSU, and V. BOGDANOVA, “Cryptographic key distribution algorithms”, ActaEd, vol. 36, no. 2, pp. 10-25, Jun. 2024.

Abstract

This article examines public key exchange algorithms applying the Diffie-Helmann-Merkel algorithm for commutative groups and the Stickel-Shpilrain algorithm for non-commutative groups. The protocols Diffie–Hellman–Merkel and Stickel–Spilrain key exchange are mathematical methods for the secure exchange of cryptographic keys over a public channel. The Diffie-Helmann-Merkel algorithm is one of the first public key protocols in cryptography. The authors examine the implementation of the respective algorithms through abelian and non-abelian algebraic structures based on the discrete logarithm problem. The man-in-the-middle attack is also examined. Examples are constructed that illustrate the operation of the mentioned algorithms

https://doi.org/10.36120/2587-3636.v36i2.10-25
pdf
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.