Secure communications over insecure channels

@article{Merkle1978SecureCO,
  title={Secure communications over insecure channels},
  author={R. Merkle},
  journal={Commun. ACM},
  year={1978},
  volume={21},
  pages={294-299}
}
  • R. Merkle
  • Published 1978
  • Computer Science
  • Commun. ACM
  • According to traditional conceptions of cryptographic security, it is necessary to transmit a key, by secret means, before encrypted massages can be sent securely. This paper shows that it is possible to select a key over open communications channels in such a fashion that communications security can be maintained. A method is described which forces any enemy to expend an amount of work which increases as the square of the work required of the two communicants to select the key. The method… CONTINUE READING
    652 Citations
    Some Open Problems In Cryptography
    • C. Leung
    • Computer Science
    • ACM Annual Conference
    • 1978
    Secure Communications over Insecure Channels Based on Short Authenticated Strings
    • 256
    • PDF
    The dining cryptographers problem: Unconditional sender and recipient untraceability
    • D. Chaum
    • Mathematics, Computer Science
    • Journal of Cryptology
    • 2004
    • 1,388
    • PDF
    A new group Diffie-Hellman key generation proposal for secure VANET communications
    • 13
    Random channel hopping schemes for key agreement in wireless networks
    • Bin Zan, Marco Gruteser
    • Computer Science
    • 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications
    • 2009
    • 8
    • PDF
    The Internet public key infrastructure
    • 39
    • PDF
    Secure personal computing in an insecure network
    • 25
    • PDF
    Weakness in Some Threshold Cryptosystems
    • 35
    • PDF

    References

    Communication theory of secrecy systems
    • C. Shannon
    • Mathematics, Computer Science
    • Bell Syst. Tech. J.
    • 1949
    • 7,242
    • Highly Influential
    • PDF