A Reliable and Effective Authentication Key Agreement Protocol Based on Complete Graph

Authors

  • Raghad K. Salih Department of Mathematics, College of Science, University of Baghdad, Baghdad, Iraq / Department of Applied Sciences, University of Technology, Baghdad, Iraq https://orcid.org/0000-0001-7659-1407
  • Ali A. Aubad Department of Mathematics, College of Science, University of Baghdad, Baghdad, Iraq https://orcid.org/0000-0002-4764-2946

DOI:

https://doi.org/10.24996/ijs.2026.67.2.33

Keywords:

Diffie Hellman, complete graph, Man in the middle, Key Agreement Protocol, Authentication

Abstract

Protecting information systems from manipulation and unauthorized access is extremely important. The Diffie-Hellman (DH) protocol is essential for key exchange because it is based on the discrete logarithm problem. Although widely used, this protocol is vulnerable to various attacks like man-in-the-middle, replay, and brute force due to its lack of validation mechanisms for authorized parties. The novel proposed algorithm treats these vulnerabilities and enhances the security of the DH scheme by performing authentication between the two parties based on the complete graph. We have used simple mathematical operations to ease implementation. The proposed work enhances the security of the DH algorithm by using the properties of the complete graph  containing n vertices and  edges. These edges are used with a pair of passwords  to construct combined public keys  from the public keys  of the sender and receiver, respectively. These combined keys ensure that only authorized parties can decrypt the message and accurately reconstruct the graph. The proposed algorithm provides strong security enhancement to the traditional DH protocol during keys exchange and prevents tampering. 

Downloads

Published

2026-02-28

Issue

Section

Computer Science

How to Cite

[1]
R. K. . Salih and A. A. . Aubad, “A Reliable and Effective Authentication Key Agreement Protocol Based on Complete Graph”, Iraqi Journal of Science, vol. 67, no. 2, pp. 1036–1049, Feb. 2026, doi: 10.24996/ijs.2026.67.2.33.

Similar Articles

1-10 of 1486

You may also start an advanced similarity search for this article.