Other Public-Key Systems
Now we know two ways that Alice can send Bob a secret message securely without a secure meeting first. They can use a key-agreement system to choose a secret key for a symmetric-key cipher, or they can use an asymmetric-key system, where Alice knows Bob’s public encryption key but only Bob knows the...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 275 |
---|---|
container_issue | |
container_start_page | 241 |
container_title | |
container_volume | |
creator | Holden, Joshua |
description | Now we know two ways that Alice can send Bob a secret message securely without a secure meeting first. They can use a key-agreement system to choose a secret key for a symmetric-key cipher, or they can use an asymmetric-key system, where Alice knows Bob’s public encryption key but only Bob knows the private decryption key. There’s a third way that uses symmetric-key cryptography to allow Alice to send Bob a message without them exchanging or agreeing on any keys at all, public or private. It’s called the three-pass protocol; it’s too inefficient for general use, but it’s interesting and |
doi_str_mv | 10.1515/9780691184555-010 |
format | Book Chapter |
fullrecord | <record><control><sourceid>jstor_walte</sourceid><recordid>TN_cdi_walterdegruyter_books_10_1515_9780691184555_010</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>j.ctvc775xv.12</jstor_id><sourcerecordid>j.ctvc775xv.12</sourcerecordid><originalsourceid>FETCH-LOGICAL-j1170-185a5487a946023a7b24ae7757390fe9344dd035ab4f46a40d64f61ebe282a773</originalsourceid><addsrcrecordid>eNpVkMtOwzAQRY0QCFq6h135gMCMPX5kiSpeolKRgLXlJA5tCaTEbqF_j6tSJFbzkM6de4exM4QLlCgvc21A5YiGpJQZIOyx3t8C9neDEKgPWQ9BgkajiY7YIIRZAUJJBQbFMTudxKnvho_LopmV2YNfD5_WIfr3cMIOatcEP_itffZyc_08usvGk9v70dU4myNqyNBIJ8lol5MCLpwuODmvtdQih9rngqiqQEhXUE3KEVSKaoW-8Nxwp7XoM7XV_XJN9F3lX7vlOjW2aNu3YBHsJrH9l9imxAkUW3DRtZ9LH6L1G6T0H7FzTTl1i6QSbPoHcEVWk-XSJOp8S81DbHdH5raMqzKZ_l5Z5OIHxbdhJQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC5500264_74_258</pqid></control><display><type>book_chapter</type><title>Other Public-Key Systems</title><source>De Gruyter eBooks</source><creator>Holden, Joshua</creator><creatorcontrib>Holden, Joshua</creatorcontrib><description>Now we know two ways that Alice can send Bob a secret message securely without a secure meeting first. They can use a key-agreement system to choose a secret key for a symmetric-key cipher, or they can use an asymmetric-key system, where Alice knows Bob’s public encryption key but only Bob knows the private decryption key. There’s a third way that uses symmetric-key cryptography to allow Alice to send Bob a message without them exchanging or agreeing on any keys at all, public or private. It’s called the three-pass protocol; it’s too inefficient for general use, but it’s interesting and</description><edition>NED - New edition</edition><identifier>ISBN: 0691183317</identifier><identifier>ISBN: 9780691183312</identifier><identifier>EISBN: 0691184550</identifier><identifier>EISBN: 9780691184555</identifier><identifier>DOI: 10.1515/9780691184555-010</identifier><identifier>OCLC: 1050718744</identifier><identifier>LCCallNum: QA268 .H653 2019</identifier><language>eng</language><publisher>United States: Princeton University Press</publisher><ispartof>The Mathematics of Secrets, 2018, p.241-275</ispartof><rights>2017 Princeton University Press</rights><rights>2018 Princeton University Press, Princeton</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/5500264-l.jpg</thumbnail><linktopdf>$$Uhttps://www.degruyter.com/document/doi/10.1515/9780691184555-010/pdf$$EPDF$$P50$$Gwalterdegruyter$$H</linktopdf><linktohtml>$$Uhttps://www.degruyter.com/document/doi/10.1515/9780691184555-010/html$$EHTML$$P50$$Gwalterdegruyter$$H</linktohtml><link.rule.ids>775,776,780,789,24760,27902,67356,69140</link.rule.ids></links><search><creatorcontrib>Holden, Joshua</creatorcontrib><title>Other Public-Key Systems</title><title>The Mathematics of Secrets</title><description>Now we know two ways that Alice can send Bob a secret message securely without a secure meeting first. They can use a key-agreement system to choose a secret key for a symmetric-key cipher, or they can use an asymmetric-key system, where Alice knows Bob’s public encryption key but only Bob knows the private decryption key. There’s a third way that uses symmetric-key cryptography to allow Alice to send Bob a message without them exchanging or agreeing on any keys at all, public or private. It’s called the three-pass protocol; it’s too inefficient for general use, but it’s interesting and</description><isbn>0691183317</isbn><isbn>9780691183312</isbn><isbn>0691184550</isbn><isbn>9780691184555</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2018</creationdate><recordtype>book_chapter</recordtype><recordid>eNpVkMtOwzAQRY0QCFq6h135gMCMPX5kiSpeolKRgLXlJA5tCaTEbqF_j6tSJFbzkM6de4exM4QLlCgvc21A5YiGpJQZIOyx3t8C9neDEKgPWQ9BgkajiY7YIIRZAUJJBQbFMTudxKnvho_LopmV2YNfD5_WIfr3cMIOatcEP_itffZyc_08usvGk9v70dU4myNqyNBIJ8lol5MCLpwuODmvtdQih9rngqiqQEhXUE3KEVSKaoW-8Nxwp7XoM7XV_XJN9F3lX7vlOjW2aNu3YBHsJrH9l9imxAkUW3DRtZ9LH6L1G6T0H7FzTTl1i6QSbPoHcEVWk-XSJOp8S81DbHdH5raMqzKZ_l5Z5OIHxbdhJQ</recordid><startdate>20181002</startdate><enddate>20181002</enddate><creator>Holden, Joshua</creator><general>Princeton University Press</general><scope>FFUUA</scope></search><sort><creationdate>20181002</creationdate><title>Other Public-Key Systems</title><author>Holden, Joshua</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-j1170-185a5487a946023a7b24ae7757390fe9344dd035ab4f46a40d64f61ebe282a773</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2018</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Holden, Joshua</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Holden, Joshua</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Other Public-Key Systems</atitle><btitle>The Mathematics of Secrets</btitle><date>2018-10-02</date><risdate>2018</risdate><spage>241</spage><epage>275</epage><pages>241-275</pages><isbn>0691183317</isbn><isbn>9780691183312</isbn><eisbn>0691184550</eisbn><eisbn>9780691184555</eisbn><abstract>Now we know two ways that Alice can send Bob a secret message securely without a secure meeting first. They can use a key-agreement system to choose a secret key for a symmetric-key cipher, or they can use an asymmetric-key system, where Alice knows Bob’s public encryption key but only Bob knows the private decryption key. There’s a third way that uses symmetric-key cryptography to allow Alice to send Bob a message without them exchanging or agreeing on any keys at all, public or private. It’s called the three-pass protocol; it’s too inefficient for general use, but it’s interesting and</abstract><cop>United States</cop><pub>Princeton University Press</pub><doi>10.1515/9780691184555-010</doi><oclcid>1050718744</oclcid><tpages>35</tpages><edition>NED - New edition</edition></addata></record> |
fulltext | fulltext |
identifier | ISBN: 0691183317 |
ispartof | The Mathematics of Secrets, 2018, p.241-275 |
issn | |
language | eng |
recordid | cdi_walterdegruyter_books_10_1515_9780691184555_010 |
source | De Gruyter eBooks |
title | Other Public-Key Systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T12%3A11%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor_walte&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Other%20Public-Key%20Systems&rft.btitle=The%20Mathematics%20of%20Secrets&rft.au=Holden,%20Joshua&rft.date=2018-10-02&rft.spage=241&rft.epage=275&rft.pages=241-275&rft.isbn=0691183317&rft.isbn_list=9780691183312&rft_id=info:doi/10.1515/9780691184555-010&rft_dat=%3Cjstor_walte%3Ej.ctvc775xv.12%3C/jstor_walte%3E%3Curl%3E%3C/url%3E&rft.eisbn=0691184550&rft.eisbn_list=9780691184555&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC5500264_74_258&rft_id=info:pmid/&rft_jstor_id=j.ctvc775xv.12&rfr_iscdi=true |