Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

An Approach to Cryptosystem through a Proposed and Secured Protocol

International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 50 - Number 16
Year of Publication: 2012
Shafiqul Abidin
Rajeev Kumar
A. R. Tripathy
Kumar Balwant Singh

Shafiqul Abidin, Rajeev Kumar, A R Tripathy and Kumar Balwant Singh. Article: An Approach to Cryptosystem through a Proposed and Secured Protocol. International Journal of Computer Applications 50(16):40-42, July 2012. Full text available. BibTeX

	author = {Shafiqul Abidin and Rajeev Kumar and A. R. Tripathy and Kumar Balwant Singh},
	title = {Article: An Approach to Cryptosystem through a Proposed and Secured Protocol},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {50},
	number = {16},
	pages = {40-42},
	month = {July},
	note = {Full text available}


The Diffie-Hellman key algorithm was the first proposed public key algorithm by which two parties can communicate with each other without having any prior knowledge of each other over an insecure communication channel proposed by Harn. et. al. Diffie-Hellman key exchange algorithm is the most famous algorithm to exchange keys over a network but it has some false and drawbacks. So in our work we have proposed a new agreement protocol based on key confirmation as well as Diffie-Hellman algorithm. This protocol also works on the elliptic curve cryptography in asymmetric encryption.


  • W. Diffie and M. Hellman, "New directions in cryptography", IEEE Transactions on Information Theory, Vol. IT-l 22, No. 6, November,1976, PP. 644-654.
  • Rescorla, E. , Diffie-Hellman Key Agreement Method, RFC 2631, IETF Network Working Group, http://www. ietf. org/rfc/rfc2631. txt.
  • Curry, Ian, Entrust Technologies, "Getting Acquainted With Entrust/Solo and Public-key Cryptography", version 1. 0, July 2000.
  • N. Howgrave-Graham and N. Smart, Lattice attacks on digital signa- ture schemes", Designs, Codes and Cryptography, 23 (2001), 283-290.
  • Bon Wook Koo, Hwan Seok Jang and Jung Hwan Song, Constructing and Crypt-analysis of a 16 £ 16 Binary Matrix as a Di®usion Layer. In K. Chae and M. Yung (Eds. ): WISA2003, LNCS 2908, pp. 489-503, Springer-Verlag 2010.
  • A. Lenstra and E. Verheul, "Selecting Cryptographic Key Sizes", Journal to Cryptology 14 (2001) pp. 255 – 293, http:/www. cryptosavvy. com.
  • Improved Authentication and Key Agreement Protocol Using Elliptic Curve Cryptography A. Chandrasekar, V. R. Rajasekar.
  • NIST, "Special Publication 800-57: Recommendation for Key Management. Part 1: General Guideline", Draft Jan. 2011.