Java language and evaluated its efficiency. Finally,
we implemented our key exchange protocol on the
open-source OpenSSL platform and evaluated its
runtime performance. Experimental results
demonstrated our proposed protocol has comparable
performance with the built-in ECDH key exchange
algorithm in the OpenSSL platform.
For the future work, we plan to improve the
algorithm of groupoid generation by increasing the
size and optimizing its structure. We also plan to
continue to verify the possibility of generating
groupoids based on different logic algebras.
Moreover, we intend to optimize the code of our
built-in extension and custom extension on the
OpenSSL platform and aim to apply it to real-world
network applications.
REFERENCES
Bharathi, M. B., Manivasagam, M. G., & Kumar, M. A.
(2017). Metrics For Performance Evaluation of
Encryption Algorithms. In International conference on
emerging trends in engineering, science and
management.
Bhavani, Y., & Krishna, B. J. (2021). Security
Enhancement Using Modified AES and Diffie–
Hellman Key Exchange. In Advances in Computational
Intelligence and Communication Technology (pp. 173-
183). Springer, Singapore.
Chen, C. M., Wang, K. H., Yeh, K. H., Xiang, B., & Wu, T.
Y. (2019). Attacks and solutions on a three-party
password-based authenticated key exchange protocol
for wireless communications. Journal of Ambient
Intelligence and Humanized Computing, 10(8), 3133-
3142.
de Ruiter, J. (2016, November). A tale of the OpenSSL state
machine: A large-scale black-box analysis. In Nordic
Conference on Secure IT Systems (pp. 169-184).
Springer, Cham.
Diffie, W., & Hellman, M. (1976). New directions in
cryptography. IEEE transactions on Information
Theory, 22(6), 644-654.
Ezhilmaran, D., & Muthukumaran, V. (2016). Key
exchange protocol using decomposition problem in
near-ring. Gazi University Journal of Science, 29(1),
123-127.
Fayoumi H F. (2020). Groupoid Factorizations in the
Semigroup of Binary Systems. Scientiae Mathematicae
Japonicae Online, e-2020-13 and to appear (2022)
Scientiae Mathematicae Japonicae, Vol.84-3.
Gentile, G., & Migliorato, R. (2002). Hypergroupoids and
cryptosystems. Journal of Discrete Mathematical
Sciences and Cryptography, 5(2), 119-138.
Grigoriev, D., & Shpilrain, V. (2014). Tropical
cryptography. Communications in Algebra, 42(6),
2624-2632.
Grigoriev, D., & Shpilrain, V. (2019). Tropical
cryptography II: extensions by homomorphisms.
Communications in Algebra, 47(10), 4224-4229.
Kader, H. M., & Hadhoud, M. M. (2009). Performance
evaluation of symmetric encryption algorithms.
Performance Evaluation, 58-64.
Li, N. (2010, April). Research on Diffie-Hellman key
exchange protocol. In 2010 2nd International
Conference on Computer Engineering and Technology
(Vol. 4, pp. V4-634). IEEE.
Megrelishvili, R. (2018). New asymmetric algorithm for
fast message transmission and tropical cryptography. In
Proceedings of the eleventh international scientific-
practical conference INTERNET-EDUCATION-
SCIENCE-2018, Vinnytsia, 22-25 May, 2018: 175-178.
ВНТУ.
Pal, O., & Alam, B. (2017). Diffie-Hellman Key Exchange
Protocol with Entities Authentication. International
Journal Of Engineering And Computer Science, 6(4).
Rudy, D., & Monico, C. (2021). Remarks on a tropical key
exchange system. Journal of Mathematical Cryptology,
15(1), 280-283.
Shpilrain, V. (2008, June). Cryptanalysis of Stickel’s key
exchange scheme. In International Computer Science
Symposium in Russia (pp. 283-288). Springer, Berlin,
Heidelberg.
Thayananthan, V., & Albeshri, A. (2015). Big data security
issues based on quantum cryptography and privacy with
authentication for mobile data center. Procedia
Computer Science, 50, 149-156.
Vidhya, E., & Rathipriya, R. (2020). Key Generation for
DNA Cryptography Using Genetic Operators and
Diffie-Hellman Key Exchange Algorithm. Computer
Science, 15(4), 1109-1115.
Yusfrizal, Y., Meizar, A., Kurniawan, H., & Agustin, F.
(2018, August). Key management using combination of
Diffie–Hellman key exchange with AES encryption. In
2018 6th International Conference on Cyber and IT
Service Management (CITSM) (pp. 1-6). IEEE.