A Novel Method for Secure Key-Sharing in 5G and Beyond
DOI:
https://doi.org/10.24203/9d56tw31Keywords:
Cryptography, Symmetric key cryptography, Asymmetric key cryptography, Key sharingAbstract
In today’s world, online communication is essential, and infrastructure for cutting-edge mobile technologies like 5G, is growing daily to meet the demand. So, information sharing security needs to be safeguarded as electronic communications spread. To implement this, cryptography is typically used, and most commonly symmetric key cryptography, due to its many advantages over other crypto-systems. However, one significant disadvantage of symmetric key system is that the single-key-sharing is exposed to all entities in a network communication system, which makes the subsequent communications vulnerable to unauthorized access. There are many approaches for securing the single-key-sharing transmission, but each has its own drawbacks. In this paper, we propose and present a novel approach to secure key-sharing over a communication network in symmetric key cryptography system which makes the single-key immune to unauthorized access. A total of four messages are exchanged between two devices for our secure key-sharing method. To implement the key sharing process, our method employs a few techniques, including asymmetric key cryptography, hash functions, machine learning-based pseudo random number generators, and timers. Our analysis shows that, besides providing similar level of confidentiality as the existing approaches, it also provides other significant improvements over the current ones, such as enhanced integrity maintenance, and authenticity verification of the two devices involved in the process. The short latency of modern 5G networks helps to balance the increased network demand caused by sending four independent messages. To determine timer duration and key validity, we propose applying AI algorithms and extending the security of our method; nevertheless, these applications fall within the purview of our upcoming study.
References
[1] M. Zubair, M. Ahmed, A. Ali, S. Naeem, and S. Anam, “Network Security and Cryptography Challenges and Trends on Recent Technologies,” Journal of Applied and Emerging Sciences, vol. 13, no. 1, pp. 1–8, 2023.
[2] M.Biswas, “THE ROLE OF CRYPTOGRAPHY TOWARDS NETWORK SECURITY,” International Journal of Multidisciplinary Educational Research, vol. 11, no. 3(7), pp. 59–64, 2022.
[3] S. Chandra, S. Paira, S. S. Alam, and G. Sanyal, “A comparative survey of Symmetric and Asymmetric Key Cryptography,” 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE), Hosur, India, pp.83–93, 2014, doi: 10.1109/ICECCE.2014.7086640.
[4] A. Kakkar, “A survey on secure communication techniques for 5G wireless heterogeneous networks,” Information Fusion, vol. 62, pp. 89–109, 2020, doi: 10.1016/j.inffus.2020.04.009.
[5] D. Bera, B. Roy, and D. Pal, “Network Security and Cryptography: A Review,” International Journal of Advances in Engineering and Management, vol. 3, no. 7, pp. 4172–4176, 2021.
[6] M. Sharma, “Review on Cryptography in Network Security,” International Journal of Engineering Research & Technology, vol. 2, no. 3, pp. 206–213, 2014.
[7] F. Maqsood, M. Ahmed, M. M. Ali, and M. A. Shah, “Cryptography: A Comparative Analysis for Modern Techniques,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 6, pp. 442–448, 2017, doi: 10.14569/IJACSA.2017.080659.
[8] E. Rawat, A. Singh, A. Mahar, and A. Agarwal, “A Review- Paper on Cryptography and Network Security,” EasyChair Preprint no. 7952, 2022, https://easychair.org/publications/preprint/2f5q.
[9] M. Al-Shabi, “A Survey on Symmetric and Asymmetric Cryptography Algorithms in information Security,” International Journal of Scientific and Research Publications (IJSRP), vol. 9, pp. 576–589, 2019, doi: 10.29322/IJSRP.9.03.2019.p8779.
[10] C. Singh, and L. Kaur, “A REVIEW OF DIFFERENT APPROACHES FOR IMPROVING NETWORK SECURITY IN CRYPTOGRAPHY,” Turkish Journal of Computer and Mathematics Education, vol. 12, no. 1, pp. 819–823, 2021.
[11] M. U. Bokhari, and Q. M. Shallal, “A Review on Symmetric Key Encryption Techniques in Cryptography,” International Journal of Computer Applications, vol. 147, no. 10, pp. 43–48, 2016, doi: 10.5120/ijca2016911203.
[12] S. Kumar, M. S. Gaur, P. S. Sharma, and D. Munjal, “A Novel Approach of Symmetric Key Cryptography,” 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), London, United Kingdom, pp. 593–598, 2021, doi: 10.1109/ICIEM51511.2021.9445343.
[13] S. Vyakaranal, and S. Kengond, “Performance Analysis of Symmetric Key Cryptographic Algorithms,” 2018 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, pp. 0411–0415, 2018, doi: 10.1109/ICCSP.2018.8524373.
[14] M. Sohal, and S. Sharma, “BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 1, pp. 1417–1425, 2022, doi: 10.1016/j.jksuci.2018.09.024.
[15] V. Cortier, and G. Steel, “A generic security API for symmetric key management on cryptographic devices,” Information and Computation, vol. 238, pp. 208–232, 2014, doi: 10.1016/j.ic.2014.07.010.
[16] A. Soleimanian, and S. Khazaei, “Publicly verifiable searchable symmetric encryption based on efficient cryptographic components,” Des. Codes Cryptography, vol. 87, no. 1, pp. 123–147, 2019, doi: 10.1007/s10623-018-0489-y.
[17] R. Masram, V. Shahare, J. Abraham, and R. Moona, “Analysis and Comparison of Symmetric Key Cryptographic Algorithms Based on Various File Features,” International Journal of Network Security & Its Applications, vol. 6, pp. 43–52, 2014, doi: 10.5121/ijnsa.2014.6404.
[18] S. Kansal, and M. Mittal, “Performance evaluation of various symmetric encryption algorithms,” 2014 International Conference on Parallel, Distributed and Grid Computing, Solan, India, pp. 105–109, 2014, doi: 10.1109/PDGC.2014.7030724.
[19] P. Singh, and P. Shende, “Symmetric Key Cryptography: Current Trends,” International Journal of Computer Science and Mobile Computing, vol. 3, no. 12, pp. 410–415, 2014.
[20] A. Maetouq, S. M. Daud, N. A. Ahmad, N. Maarop, N. N. A. Sjarif, and H. Abas, “Comparison of Hash Function Algorithms Against Attacks: A Review,” International Journal of Advanced Computer Science and Applications, vol. 9, no. 8, pp. 98–103, 2018, doi: 10.14569/IJACSA.2018.090813.
[21] A. Taparia, S. K. Panigrahy, and S. K. Jena, “Secure key exchange using enhanced Diffie-Hellman protocol based on string comparison,” 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, pp. 722–726, 2017, doi: 10.1109/WiSPNET.2017.8299856.
[22] M. A. Latif, M. B. Ahmad, and M. K. Khan, “A Review on Key Management and Lightweight Cryptography for IoT,” 2020 Global Conference on Wireless and Optical Technologies (GCWOT), Malaga, Spain, pp. 1–7, 2020, doi: 10.1109/GCWOT49901.2020.9391613.
[23] M. AlRoubiei, T. AlYarubi, and B. Kumar, “Critical Analysis of Cryptographic Algorithms,” 2020 8th International Symposium on Digital Forensics and Security (ISDFS), Beirut, Lebanon, pp. 1–7, 2020, doi: 10.1109/ISDFS49300.2020.9116213.
[24] A. Hamza, and B. Kumar, “A Review Paper on DES, AES, RSA Encryption Standards,” 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), Moradabad, India, pp. 333–338, 2020, doi: 10.1109/SMART50582.2020.9336800.
[25] H. Xu, K. Thakur, A. S. Kamruzzaman, and M. L. Ali, “Applications of Cryptography in Database: A Review,” 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, Canada, pp. 1–6, 2021, doi: 10.1109/IEMTRONICS52119.2021.9422663.
[26] M. D. Bernardi, M. H. R. Khouzani, and P. Malacaria, “Pseudo-Random Number Generation Using Generative Adversarial Networks,” ECML PKDD 2018 Workshops, Cham, Springer International Publishing, pp. 191–200, 2019, doi: 10.1007/978-3-030-13453-2_15.
[27] A. Argabi, and M. Alam, “A new Cryptographic Algorithm AEDS (Advanced Encryption and Decryption Standard) for data security,” International Advanced Research Journal in Science, Engineering and Technology, vol. 6, pp 1–7, 2019, doi: 10.17148/IARJSET.2019.61001.
[28] L. Zhou, J. Chen, Y. Zhang, C. Su, and M. A. James, “Security analysis and new models on the intelligent symmetric key encryption,” Computers & Security, vol. 80, pp. 14–24, 2019, doi: 10.1016/j.cose.2018.07.018.
[29] M. Asgari-Chenaghlu, M. A. Balafar, and M. R. Feizi-Derakhshi, “A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation,” Signal Processing, vol. 157, pp. 1–13, 2019, doi: 10.1016/j.sigpro.2018.11.010.
[30] B. Zahednejad, L. Ke, and J. Li, “A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols,” Security and Communication Networks, pp. 1–15, 2020, doi: 10.1155/2020/8848389.
[31] N. A. Gunathilake, W. J. Buchanan, and R. Asif, “Next Generation Lightweight Cryptography for Smart IoT Devices: : Implementation, Challenges and Applications,” 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, pp. 707–710, 2019, doi: 10.1109/WF-IoT.2019.8767250.
[32] A. Shah, and M. Engineer, “A Survey of Lightweight Cryptographic Algorithms for IoT-Based Applications,” Smart Innovations in Communication and Computational Sciences, Springer Singapore, pp. 283–293, 2019, doi: 10.1007/978-981-13-2414-7_27.
[33] E. Jincharadze, “CRITICAL ANALYSIS OF SOME CRYPTOGRAPHY ALGORITHMS,” Scientific and Practical Cyber Security Journal (SPCSJ), vol. 1, no. 2, pp. 60–68, 2017.
[34] Y. Alemami, M. A. Mohamed, and S. Atiewi, “Research on Various Cryptography Techniques,” International Journal of Recent Technology and Engineering, vol. 8, pp. 395–405, 2019, doi: 10.35940/ijrte.B1069.0782S319.
[35] M. F. Mushtaq, S. Jamel, A. H. Disina, Z. A. Pindar, N. S. A. Shakir, and M. M. Deris, “A Survey on the Cryptographic Encryption Algorithms,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 11, pp. 333–344, 2017, doi: 10.14569/IJACSA.2017.081141.
[36] S. Soomro, M. R. Belgaum, Z. Alansari, and R. Jain, “Review and Open issues of Cryptographic Algorithms in Cyber Security,” 2019 International Conference on Computing, Electronics & Communications Engineering (iCCECE), London, UK, pp. 158–162, 2019, doi: 10.1109/iCCECE46942.2019.8941663.
[37] S. Thorat, R. Sharma, and S. Pansare, “ANALYSIS OF SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS,” International Research Journal of Engineering and Technology (IRJET), vol. 4, no. 2, pp. 1628–1630, 2017.
[38] R. Andriani, S. E. Wijayanti, and F. W. Wibowo, “Comparision Of AES 128, 192 And 256 Bit Algorithm For Encryption And Description File,” 2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia, pp. 120–124, 2018, doi: 10.1109/ICITISEE.2018.8720983.
[39] M. Abu-Faraz, and Z. A. Qadi, “Using Highly Secure Data Encryption Method for Text File Cryptography,” International Journal of Computer Science and Network Security, vol. 21, pp. 53–60, 2021, doi: 10.22937/IJCSNS.2021.21.12.8.
[40] J. A. P. Artiles, D. P. B. Chaves, and C. Pimentel, “Image encryption using block cipher and chaotic sequence,” Signal Processing: Image Communication, vol. 79, pp. 24–31, 2019, doi: 10.1016/j.image.2019.08.014.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Debjyoti Bagchi, Sanjib Sil, Soubhik Sen

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The articles published in International Journal of Computer and Information Technology (IJCIT) is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.