欢迎来到天天文库
浏览记录
ID:40356410
大小:2.11 MB
页数:11页
时间:2019-07-31
《New+Directions+in+Cryptography+》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、644IEEETRANSACTIONSONINFORMATIONTHEORY,VOL.IT-22,NO.6,NOVEMBER1976NewDirectionsinCryptographyInvitedPaperWHITFIELDDIFFIEANDMARTINE.HELLMAN,MEMBER,IEEEAbstract-Twokindsofcontemporarydevelopmentsincryp-Thebestknowncryptographicproblemisthatofpri-tographyareexamined.Wideningapplicationsoftelepro
2、cessingvacy:preventingtheunauthorizedextractionofinforma-havegivenrisetoaneedfornewtypesofcryptographicsystems,tionfromcommunicationsoveraninsecurechannel.Inwhichminimizetheneedforsecurekeydistributionchannelsandordertousecryptographytoinsureprivacy,however,itissupplytheequivalentofawrittensi
3、gnature.Thispapersuggestswaystosolvethesecurrentlyopenproblems.Italsodiscusseshowcurrentlynecessaryforthecommunicatingpartiestosharethetheoriesofcommunicationandcomputationarebeginningtoakeywhichisknowntonooneelse.Thisisdonebysend-providethetoolstosolvecryptographicproblemsoflongstand-ingthek
4、eyinadvanceoversomesecurechannelsuchasing.privatecourierorregisteredmail.Aprivateconversationbetweentwopeoplewithnoprioracquaintance-isacom-monoccurrenceinbusiness,however,anditisunrealistictoexpectinitialbusinesscontactstobepostponedlongI.INTRODUCTIONenoughforkeystobetransmittedbysomephysica
5、lmeans.WESTANDTODAYonthebrinkofarevolutioninThecostanddelayimposedbythiskeydistributioncryptography.Thedevelopmentofcheapdigitalproblemisamajorbarriertothetransferofbusinesshardwarehasfreeditfromthedesignlimitationsofme-communicationstolargeteleprocessingnetworks.chanicalcomputingandbroughtth
6、ecostofhighgradeSectionIIIproposestwoapproachestotransmittingcryptographicdevicesdowntowheretheycanbeusedinkeyinginformationoverpublic(i.e.,insecure)channelssuchcommercialapplicationsasremotecashdispenserswithoutcompromisingthesecurityofthesystem.Inaandcomputerterminals.Inturn,suchapplication
7、screatepublickeycryptosystemencipheringanddecipheringareaneedfornewtypesofcryptographicsystemswhichgovernedbydistinctkeys,EandD,suchthatcomputingminimizethenecessityofsecurekeydistributionchannelsDfromEiscomputationallyinfeasible(e.g.,requiri
此文档下载收益归作者所有
点击更多查看相关文章~~