Secure communications over insecure channels
@article{Merkle1978SecureCO, title={Secure communications over insecure channels}, author={R. Merkle}, journal={Commun. ACM}, year={1978}, volume={21}, pages={294-299} }
According to traditional conceptions of cryptographic security, it is necessary to transmit a key, by secret means, before encrypted massages can be sent securely. This paper shows that it is possible to select a key over open communications channels in such a fashion that communications security can be maintained. A method is described which forces any enemy to expend an amount of work which increases as the square of the work required of the two communicants to select the key. The method… CONTINUE READING
Topics from this paper
Paper Mentions
Blog Post
652 Citations
Secure Communications over Insecure Channels Using an Authenticated Channel
- Computer Science
- 2005
- 15
- PDF
Secure Communications over Insecure Channels Based on Short Authenticated Strings
- Computer Science
- CRYPTO
- 2005
- 256
- PDF
The dining cryptographers problem: Unconditional sender and recipient untraceability
- Mathematics, Computer Science
- Journal of Cryptology
- 2004
- 1,388
- PDF
A new group Diffie-Hellman key generation proposal for secure VANET communications
- Computer Science
- 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)
- 2016
- 13
Random channel hopping schemes for key agreement in wireless networks
- Computer Science
- 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications
- 2009
- 8
- PDF
References
Communication theory of secrecy systems
- Mathematics, Computer Science
- Bell Syst. Tech. J.
- 1949
- 7,242
- Highly Influential
- PDF