Secure Communication Using Diffie-Hellman Key Exchange, Aes & Sha For Data Integrity

Authors

  • Mohammed Ibrahim Ali B.E. Student, Department of IT, Lords Institute of Engineering and Technology, Hyderabad Author
  • Mir Umair Uzzama B.E. Student, Department of IT, Lords Institute of Engineering and Technology, Hyderabad Author
  • Mohammed Masooduddin Siddiqui B.E. Student, Department of IT, Lords Institute of Engineering and Technology, Hyderabad Author
  • Dr. K Nagi Reddy Head of Department, Department of IT, Lords Institute of Engineering and Technology, Hyderabad Author

DOI:

https://doi.org/10.62647/

Keywords:

Diffie-Hellman Key Exchange algorithm, Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA)

Abstract

In an increasingly interconnected world,
where data exchange across digital
platforms is a fundamental part of daily
operations, ensuring the security of
communication channels has become a
matter of paramount importance. This
project aims to construct a secure
communication architecture by
integrating multiple cryptographic
techniques to ensure confidentiality,
integrity, and protection against
unauthorized access. The design
incorporates the Diffie-Hellman Key
Exchange algorithm to securely establish
encryption keys, the Advanced
Encryption Standard (AES) for
encrypting sensitive information during
transmission, and the Secure Hash
Algorithm (SHA) to verify data integrity.
This multi-layered approach protects
against eavesdropping, data
manipulation, and unauthorized
intrusions. By leveraging the combined
strengths of these widely recognized
cryptographic techniques, this project
establishes a secure and reliable
framework for digital communication,
particularly in environments where data
confidentiality and integrity are of utmost
concern.

Downloads

Download data is not yet available.

Downloads

Published

22-05-2025

How to Cite

Secure Communication Using Diffie-Hellman Key Exchange, Aes & Sha For Data Integrity. (2025). International Journal of Information Technology and Computer Engineering, 13(2), 1128-1135. https://doi.org/10.62647/