Figure 1: Analysis for the Process Time.
A linear graph is shown in Fig 1 with ten different
sizes of data files and results compared between RSA
and the proposed scheme. The linear results are
shown as the best result of the proposed scheme
which achieved a fast process time with all the key
points in comparison RSA method.
5 CONCLUSION
User data is the first essential point in the whole
world. The proposed scheme is preceding quick
response for hiding user data. The logic gate bit-XOR
is making too fast an encryption process in
milliseconds. The MITM attack is prevented in this
proposed scheme by the key distribution scheme and
data is converted into an unreadable form by the
suggested linguistic scheme for generating a secure
and fast transmission. Cryptanalysis attacks are
proofing for the protection of different kinds of
attacks which is representing the best result of attacks.
The fast access time is presented with encryption time
and algorithm running time in different sizes of data.
A comparative result is to generate a more secure and
fast access time after adding the proposed scheme.
Future work will be enhanced the scheme and
improve the result of security and privacy key points
by modern data hiding schemes.
REFERENCES
Pan, J., Qian C. and Rigerud, M. (2022). Signed (Group)
Diffie-Hellman Key Exchange with Tight Security.
Journal of Cryptography. 35(4):1 42.
https://doi.org/10.1007/s00145-022-09438-y
Manjula, T. and Anand, B. (2021). A Secured
Multiplicative Diffie Hellman Key Exchange Routing
Approach for Mobile Ad Hoc Network. Journal of
Ambient Intelligence and Humanized Computing.
12(3):1 11. https://doi.org/10.1007/s12652-019-01612-
8
Ermatita, Prastyo Y. B., I. Pradnyana. W. W. and Adrezo,
M. (2020). Diffie-Hellman Algorithm for Securing
Medical Record Data Encryption keys. International
Conference on Informatics, Multimedia, Cyber and
Information System (ICIMCIS). IEEE. 1 5. doi:
10.1109/ICIMCIS51567.2020.9354297.
Mishra, M. R. and Kar J. (2019). A Study on Diffie-
Hellman Key Exchange Protocols. International
Journal of Pure and Applied Mathematics. 1 12. doi:
10.12732/ijpam.v114i2.2
Aryan, Kumar C. and Vincent D. R. P. M. (2017). Enhanced
Diffie-Hellman Algorithm for Reliable Key Exchange.
ICSET IOP Conf. Series: Materials Science and
Engineering. 1 8. doi:10.1088/1757-899X/263/4/
042015
Knezevic, M., Tomovic, S. and Mihaljevic, M. J. (2020).
Man-In-The-Middle Attack against Certain
Authentication Protocols Revisited: Insights into the
Approach and Performances Re-Evaluation.
Electronics. 9(8):1 23. doi:10.3390/electronics9081296.
Pavicic, M. (2021). How Secure Are Two- Way Ping-Pong
and LM05 QKD Protocols under a Man-in-the-Middle
Attack?. Entropy. 23(2):1 10. https://doi.org/10.3390/
e23020163
Munir, N., Khan, M., Shah, T., Alanazi, A. S. and Hussain,
I. (2021). Cryptanalysis of Nonlinear Confusion
Component Based Encryption Algorithm. Integration.
79:1 7. https://doi.org/10.1016/j.vlsi.2021.03.004
Hua, Z., Li, J., Chen, Y. and Yi, S. (2021). Design and
Application of an S-Box Using Complete Latin Square.
Nonlinear Dynamics. 104:1 19. https://doi.org/10.1007/
s11071-021-06308-3
AI4IoT 2023 - First International Conference on Artificial Intelligence for Internet of things (AI4IOT): Accelerating Innovation in Industry