Key exchange using ternary system to enhance security

Sareh Assiri, Bertrand Cambou, D. Duane Booher, Dina Ghanai Miandoab, Mohammad Mohammadinodoushan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations

Abstract

This paper presents how the security of key distribution protocols can be enhanced using the ternary arithmetic conversion, along with shared keys between communicating parties. It is shown that both the transmitting and the receiving party can calculate his own private key without exchanging it during the unsecured channel. Moreover, it is explained how the binary private keys can be independently generated by both communicating parties directly from the public ternary keys. The private keys are used to encrypt messages and allow secure communication through open untrusted channels. In addition, it is shown how addressable cryptographic tables technology can be exploited to design protocols that exchange safely the shared keys.

Original languageEnglish (US)
Title of host publication2019 IEEE 9th Annual Computing and Communication Workshop and Conference, CCWC 2019
EditorsSatyajit Chakrabarti, Himadri Nath Saha
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages488-492
Number of pages5
ISBN (Electronic)9781728105543
DOIs
StatePublished - Mar 12 2019
Event9th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2019 - Las Vegas, United States
Duration: Jan 7 2019Jan 9 2019

Publication series

Name2019 IEEE 9th Annual Computing and Communication Workshop and Conference, CCWC 2019

Conference

Conference9th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2019
Country/TerritoryUnited States
CityLas Vegas
Period1/7/191/9/19

Keywords

  • cryptographic table
  • key exchange
  • private key
  • public key
  • quantum key distribution
  • ternary security

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Key exchange using ternary system to enhance security'. Together they form a unique fingerprint.

Cite this