Emperor: cheap legal secure cryptography for the Web

@inproceedings{Davis1999EmperorCL,
  title={Emperor: cheap legal secure cryptography for the Web},
  author={C. Davis and C. Eick},
  booktitle={SAC '99},
  year={1999}
}
The barriers to ubiquitous strong cryptography for low volume applications on the world wide web are analyzed. We propose a cryptographic protocol heavily influenced by the Difie-Hellman and ElCamal protocols which has the virtue of allowing secure communication with no previous key distribution, no random number generation on the browser side and no violation of the laws protecting intellectual property. A simpk extension allows for password encrypted signatures. We make a proposal whose… Expand

Figures, Tables, and Topics from this paper

A heuristic search based factoring tool
  • C. Davis, C. Eick
  • Computer Science
  • Proceedings 12th IEEE Internationals Conference on Tools with Artificial Intelligence. ICTAI 2000
  • 2000
TLDR
It is shown how to cast the problem of factoring integers as a state-based search to which the techniques of AI may be applied, using small primes as operators, and the properties of a novel sub-class of integers, pseudo-smooth integers, which are useful in construction of an expanded search. Expand

References

SHOWING 1-10 OF 24 REFERENCES
A method for obtaining digital signatures and public-key cryptosystems
TLDR
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys. Expand
The risks of key recovery, key escrow, and trusted third-party encryption
TLDR
This report examines the fundamental properties of these requirements and attempts to outline the technical risks, costs, and implications of deploying systems that provide government access to encryption keys. Expand
New directions in cryptography
TLDR
This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing. Expand
A public key cryptosystem and a signature scheme based on discrete logarithms
TLDR
A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields. Expand
Information Hiding: Techniques for Steganography and Digital Watermarking
TLDR
This first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia is presented. Expand
The Essential Role of Trusted Third Parties in Electronic Commerce
The article describes the role of "Certification Authorities" (CAs) in the emerging field of electronic commerce. CAs issue certificates to participants in electronic commerce that provide indicia ofExpand
JavaScript: The Definitive Guide
TLDR
This Fifth Edition is completely revised and expanded to cover JavaScript as it is used in today's Web 2.0 applications, with new chapters that explain everything you need to know to get the most out of JavaScript. Expand
Elementary Number Theory
Some preliminary considerations divisibility theory in the integers primes and their distribution the theory of congruences Fermat's theorem number-theoretic functions Euler's generalization ofExpand
Hypertext Markup Language - 2.0
The Hypertext Markup Language (HTML) is a simple markup language used to create hypertext documents that are platform independent. HTML documents are SGML documents with generic semantics that areExpand
Ten Risks of PKI: What You're not Being Told about Public Key Infrastructure
  • Computer Security Journal
  • 2000
...
1
2
3
...