Title: Secure key exchange protocol using graph and trusted third party
Authors: Maroti Deshmukh; Arjun Singh Rawat
Addresses: National Institute of Technology, Uttarakhand, India ' National Institute of Technology, Uttarakhand, India
Abstract: The exchange of cryptographic keys poses a challenge due to the need for secure communication channels. This paper presents an algorithm that employs a random complete graph, a trusted third party, and a circuit to ensure secure key transmission. The trusted third party generates a graph and uses a circuit (a path from sender to receiver) to transmit the key alongside the message. This process enhances security by making key tracing difficult. The proposed scheme generates a common session key through a graph permutation, outperforming existing schemes in terms of key size. It accommodates varying key sizes, making it adaptable to different scenarios. Moreover, the approach minimises computation and communication overhead by utilising a limited number of steps, graph weights, permutations, and multiplications, while involving a trusted third party.
Keywords: key exchange protocol; asymmetric key cryptography; complete graph; key distribution; trusted third party; TTP.
DOI: 10.1504/IJCNDS.2024.139329
International Journal of Communication Networks and Distributed Systems, 2024 Vol.30 No.4, pp.393 - 412
Received: 16 Feb 2023
Accepted: 25 Apr 2023
Published online: 01 Jul 2024 *