FGPA Usage of Modified Diffie-Hellman Key Trade calculation utilizing Zero Knowledge Proof

Sri Harsha Davuluri*, Srinivas Bachu**, K. Satya Sujith***
*_**_*** Assistant Professor, Department of Electronics and Communication Engineering, Guru Nanak Institutions Technical Campus, Hyderabad, Telangana, India.
Periodicity:February - April'2015
DOI : https://doi.org/10.26634/jes.4.1.3694

Abstract

There are networks and entity groupings that require authentications while preserving the privacy of the entity being authenticated. Zero – Knowledge Proof (ZKP) plays a vital role in authentications without revealing the secret information. The proposed work carries criticism of ZKP, and Diffie–Hellman Key Exchange Algorithm (DHKEA). A new ZKP has been proposed based on modifications of the DHKEA. As per the modifications, two versions of the proposed protocols were developed. Verilog HDL is effectively utilized to complete the design of the proposed protocols. Results will be verified through simulations and FPGA target board. The proposed tradition fulfills the ZKP properties and are secured against discrete logarithm strike and man-in-the middle attack. The proposed figuring serves as key exchange count with the development to affirmation organizations.

Keywords

Authentication, Networks, Entity groupings Zero-Knowledge Proof, Verilog HDL, Diffie-Hellman, FPGA.

How to Cite this Article?

Davuluri,S,H., Bachu,S., and Sujith,S.K. (2015). FGPA Usage of Modified Diffie-Hellman Key Trade calculation utilizing Zero Knowledge Proof. i-manager’s Journal on Embedded Systems, 4(1), 32-40. https://doi.org/10.26634/jes.4.1.3694

References

[1]. Ibrahem, M.K. (2012), “Modification of Diffie Hellman Key Exchange Algorithm”, Future Communication Networks (ICFCN), International Conference, pp. 147 - 152.
[2]. Emmanuel Bresson, Olivier Chevassut, David Pointcheval, and Jean-Jacques Quisquater (2001). “Provably Authenticated Group Diffie-Hellman Key Exchange”, Computer and Communication Security, Proc. of ACM CCS'01, p.p. 255-264.
[3]. Back, Amanda, (2009), "The Diffe-Hellman Key Exchange", Retrieved from http://129.81.170.14 /~erowland/courses/2009-2/projects/Back.pdf.
[4]. Clausen, Andrew, (2007), "Logical Composition of Zero - Knowledge Proofs", Retrieved from http:// www.econ.upenn.edu /_clausen.
[5]. Endre Bangerter, et al, (2009), "On the Design and Implementation of Efficient Zero-Knowledge Proofs of Knowledge", Proceedings of the 2nd ECRYPT Conference on Software Performance Enhancement for Encryption and Decryption and Cryptographic Compilers (SPEEDCC' 09), Berlin, Germany.
[6]. Fischer, Michael J., (2010), "Cryptography and Computer Security", Department of Computer Science, Yale University.
[7]. Forouzan, Behrouz A. (2008), Cryptography and Network Security, McGraw-Hill, Int. Ed, 2008.
[8]. Hellman, Martin E., (2002), "An Overview of Public Key Cryptography", IEEE Communications Magazine, pp: 42- 49.
[9]. P. Bhattacharya, M. Debbabi and H. Otrok, (2005), "Improving the Diffie-Heliman Secure Key Exchange", International Conference on Wireless Networks, Communications and Mobile Computing.
[10]. Maurer Ueli, (2009), "Unifying Zero-Knowledge Proofs of Knowledge", Africacrypt 2009, LNCS 5580, pp. 272–286.
[11]. Michael Backes and Dominique Unruha, (2009). "Computational Soundness of Symbolic Zero-Knowledge Proofs", Journal of Computer Security, Vol. 18, No. 6, pp. 1077-1155, 2010.
[12]. Mohr, Austin (2007), "A Survey of Zero-Knowledge Proofs with Applications to Cryptography", Southern Illinois University.
[13]. Kizza, Joseph M, (2010), "Feige-Fiat-Shamir ZKP Scheme Revisited", International Journal of Computing and ICT Research, Vol. 4, No. 1.
[14]. Simari, Gerardo I., (2002), "A Primer on Zero Knowledge Protocols", Technical report, Universidad Nacional del Sur, Buenos aires, argentina.
[15]. Stallings, William (2010), "Cryptography and Network Security", Prentice Hall, 5th Ed. 2010.
[16] . Velten, Michael, (2006), "Zero-Knowledge The Magic of Cryptography", Saarland University.
[17]. Krantz, Steven G., (2007), "Zero Knowledge Proofs", AIM Preprint Series, Volume 10-46.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.