Key Exchange Using 'Keyless Cryptography'
نویسندگان
چکیده
In a classical cryptosystem, as opposed to a public-key cryptosystem, communication between users is based on a secret key known to them, but no others. A key-distribution protocol is employed to distribute copies of this secret key to the users. One simple way to perform key-distribution makes use of out-of-band communication a diplomatic courier, for example. More desirable for a computer network, however, is a key-distribution protocol that uses the network itself for all communication. Protocols that do this are described in [2,1] For users A and B to agree on a secret key k,,, each first chooses a secret bit string. Let k,[l]k,[2] . . . k,[2n] be k,, the bit string chosen by A, and k,[l]k,[2] . . k,[2n] be k,, the bit string chosen by B. Assume that user names are totally ordered so that each can independently compute the same name k,, for the key on which they will agree. A then constructs 2n messages, one for each bit in k,, where each message has the form:
منابع مشابه
Blockchain: Data Malls, Coin Economies and Keyless Payments
We discuss several uses of blockchain (and, more generally, distributed ledger) technologies outside of cryptocurrencies with a pragmatic view. We mostly focus on three areas: the role of coin economies for what we refer to as data malls (specialized data marketplaces); data provenance (a historical record of data and its origins); and what we term keyless payments (made without having to know ...
متن کاملLock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems
While most automotive immobilizer systems have been shown to be insecure in the last few years, the security of remote keyless entry systems (to lock and unlock a car) based on rolling codes has received less attention. In this paper, we close this gap and present vulnerabilities in keyless entry schemes used by major manufacturers. In our first case study, we show that the security of the keyl...
متن کاملKeyless Cryptography in Grid Computing Using Cyclic Shift Transposition Algorithm
Grid computing involves in the process of forming dynamic virtual organizations and associated resources in which the security is an important factor.Grid computing, is a distributed computing model in which new kind of systems are combined to form a heterogeneous computational resources such as computers, storage space, sensors, and experimental data. The grid can seamlessly, transparently and...
متن کاملAnalysis of Keyless Massive MIMO-based Cryptosystem Security
A cryptosystem for wireless communications, recently proposed by T. Dean and A. Goldsmith, is considered. That system can be regarded as a second revolution in cryptography because the confidentiality of the messages transmitted over a wireless massive MIMO-based channel is provided by the difference in the space locations of legal and illegal users and it does not require any secret key distri...
متن کاملA New Ring-Based SPHF and PAKE Protocol On Ideal Lattices
emph{ Smooth Projective Hash Functions } ( SPHFs ) as a specific pattern of zero knowledge proof system are fundamental tools to build many efficient cryptographic schemes and protocols. As an application of SPHFs, emph { Password - Based Authenticated Key Exchange } ( PAKE ) protocol is well-studied area in the last few years. In 2009, Katz and Vaikuntanathan described the first lattice-based ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Process. Lett.
دوره 16 شماره
صفحات -
تاریخ انتشار 1983