•  
  •  
 

Corresponding Author

Rasha M. Mohsin

Document Type

Article

Keywords

Security attacks, Diffie-Hellman protocol, Cryptography, Wav file

Abstract

Social media platforms security growing challenge of Security vulerabilities, underscoring for secure communication channels and robust user privacy safeguards. Althought key exchange protocol of the Diffie-Hellman (DH) widely adopted, remains various attacks of susceptible asnumber_theoretic exploits, Discrete Logarithm Attacks (DLAs) and Man_in_the_Middle Attacks (MITMAs). This study aim to generate cryptographic key depend on WAV audio files. By operating the entropy and distinctiveness of speech and ambient sound. Audio features has extracting by system to generat secure keys compatible with the DH protocol. The facilitate of these keys is strong encryption and decryption processes, thereby that enhancing the security of communication. Method's effectiveness, highlighting its suitability for real-time deployment and its potential to enhance data protection across various applications which experimental validation has confirmed.

Share

COinS