10.25673/122121">


Proceedings of International Conference on Applied Innovation in IT
2025/08/29, Volume 13, Issue 4, pp.261-267

Binary Representation Strings for a New Version of Key Exchange Scheme


Ruma Kareem K. Ajeena and Sara Jabbar Yaqoob


Abstract: The key exchange scheme (KES) is considered an essential component of many encryption algorithms. Several versions of KES have previously been proposed by numerous researchers in the cryptographic research community. In this work, a new version of KES is proposed over the binary extension field F₂ᵐ. The public and private parameters of the proposed KES are represented as binary representation strings (BRSs) over F₂ᵐ. The users’ private keys are computed as series of BRSs through random selection of binary element strings with different lengths. The public keys are also computed as BRS series over F₂ᵐ. In addition, a new algorithm for generating the shared secret key as a BRS series (BRSs-KES) is presented. Some experimental results of the proposed BRSs-KES are implemented using Python programming language. The random generation of BRSs determines the security level of the proposed scheme. By using the proposed BRSs-KES algorithm, more suitable and secure communication is achieved in practice.

Keywords: Cryptography, Key Exchange Scheme, Binary Representation String, Security.

DOI: 10.25673/122121

Download: PDF

References:

  1. R. K. K. Ajeena and H. Kamarulhaili, “On the distribution of scalar k for elliptic scalar multiplication,” in AIP Conf. Proc., vol. 1682. Melville, NY, USA: AIP Publishing, Oct. 2015.
  2. H. J. Muhasin, A. Y. Gheni, and H. A. Yousif, “Proposed model for data protection in information systems of government institutions,” Bull. Elect. Eng. Inform., vol. 11, pp. 1715–1722, 2022.
  3. W. H. Abdulsalam, Z. H. Ibrahim, B. H. Majeed, and H. T. S. AlRikabi, “Utilizing machine learning techniques to predict university students’ digital competence,” Int. J. Eng. Pedagogy, vol. 15, 2025.
  4. M. H. Abd, O. A. Raheem, J. Kh-Madhloom, and V. Bugrov, “Frequency dispersion of the signal in the recursive digital section of the second order,” J. Phys.: Conf. Ser., vol. 1530, p. 012086, May 2020.
  5. L. A. Tawfeeq, S. S. Hussein, and S. S. Altyar, “Leveraging transfer learning in deep learning models for enhanced early detection of Alzheimer’s disease from MRI scans,” 2025.
  6. B. J. AlKhafaji, M. A. Salih, S. A. Shnain, O. A. Rashid, A. A. Rashid, and M. T. Hussein, “Applying the artificial neural networks with multiwavelet transform on phoneme recognition,” J. Phys.: Conf. Ser., vol. 1804, p. 012040, Feb. 2021.
  7. S. B. Sadkhan and D. M. Reda, “A proposed security evaluator for cryptosystem based on information theory and triangular game,” in Proc. Int. Conf. Advanced Science and Engineering (ICOASE), Oct. 2018, pp. 306–311.
  8. N. K. Abbas and R. K. K. Ajeena, “More secure on the DL-encryption schemes using the TFM function,” in AIP Conf. Proc., vol. 2398. Melville, NY, USA: AIP Publishing, Oct. 2022.
  9. G. E. Arif, F. A. Abdullah, and Y. Al-Douri, “Modeling of structural properties of hexagonal semiconductors,” Procedia Eng., vol. 53, pp. 707–709, 2013.
  10. M. H. Hashem and R. K. K. Ajeena, “The tensor product bipartite graph for symmetric encryption scheme,” in AIP Conf. Proc., vol. 2591. Melville, NY, USA: AIP Publishing, Mar. 2023.
  11. S. Choi, K.-C. Ha, Y.-O. Kim, and D. Moon, “Key exchange protocol using matrix algebras and its analysis,” J. Korean Math. Soc., vol. 42, pp. 1287–1309, 2005.
  12. H. B. A. Wahab, A. J. Abdul-Hossen, and A. S. Kadhom, “Encrypted image watermark in audio files using homogenous Diffie–Hellman with Chebyshev polynomial,” Eng. Tech. J., vol. 34, 2016.
  13. P. Deshpande, S. Santhanalakshmi, P. Lakshmi, and A. Vishwa, “Experimental study of Diffie–Hellman key exchange algorithm on embedded devices,” in Proc. Int. Conf. Energy, Communication, Data Analytics and Soft Computing (ICECDS), Aug. 2017, pp. 2042–2047.
  14. J. Partala, “Algebraic generalization of Diffie–Hellman key exchange,” J. Math. Cryptol., vol. 12, pp. 1–21, 2018.
  15. T. Mefenza and D. Vergnaud, “Polynomial interpolation of the generalized Diffie–Hellman and Naor–Reingold functions,” Des. Codes Cryptogr., vol. 87, pp. 75–85, 2019.
  16. N. Mäurer, T. Gräupl, C. Gentsch, and C. Schmitt, “Comparing different Diffie–Hellman key exchange flavors for LDACS,” in Proc. AIAA/IEEE 39th Digital Avionics Systems Conf. (DASC), Oct. 2020, pp. 1–10.
  17. M. Kara, A. Laouid, M. AlShaikh, A. Bounceur, and M. Hammoudeh, “Secure key exchange against man-in-the-middle attack: Modified Diffie–Hellman protocol,” J. Ilmiah Tek. Elektro Komputer dan Inform., vol. 7, pp. 380–387, 2021.
  18. J. M. Philip, M. J. Thomas, A. J. Sarthik, and R. Aishvarya, “Secure text transfer using Diffie–Hellman key exchange based on cloud,” Int. J. Adv. Eng. Manag., vol. 3, pp. 998–1004, 2021.
  19. A. Ruggeri and M. Villari, “Improving the key exchange process of the extended triple Diffie–Hellman protocol with blockchain,” in Proc. Eur. Conf. Service-Oriented and Cloud Computing. Cham, Switzerland: Springer, Mar. 2022, pp. 49–58.
  20. R. K. K. Ajeena, “A proposed modification of Diffie–Hellman key exchange based on integer matrices,” Int. J. Math. Comput. Sci., vol. 19, pp. 211–218, 2024.
  21. P. Kanagala, “Design and analysis of a Diffie–Hellman-based network security and cryptography approach,” in Research Advances in Network Technologies. Boca Raton, FL, USA: CRC Press, 2025, pp. 206–223.
  22. D. Alrwashdeh, T. Alkhouli, A. S. R. Alhawiti, A. Allouf, H. Edduweh, and A. Al-Husban, “On two novel generalized versions of Diffie–Hellman key exchange algorithm based on neutrosophic and split-complex integers and their complexity analysis,” Int. J. Neutrosophic Sci., vol. 25, pp. 1–10, 2025.
  23. G. W. Reitwiesner, “Binary arithmetic,” in Advances in Computers, vol. 1. New York, NY, USA: Elsevier, 1960, pp. 231–308.
  24. M. D. Fried and M. Jarden, Field Arithmetic, vol. 11. Berlin, Germany: Springer, 2005.
  25. M. I. Saju, “Algebraic extension fields over finite fields and their applications to cryptography,” Ph.D. dissertation, St. Joseph’s College, 2017.


    HOME

       - Conference
       - Journal
       - Paper Submission to Journal
       - Paper Submission to Conference
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 13, Issue 4 (ICAIIT 2025)
       - Volume 13, Issue 3 (ICAIIT 2025)
       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2025
         - Photos
         - Reports

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.