Secure communications over insecure channels
Open Access
- 1 April 1978
- journal article
- research article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 21 (4), 294-299
- https://doi.org/10.1145/359460.359473
Abstract
According to traditional conceptions of cryptographic security, it is necessary to transmit a key, by secret means, before encrypted massages can be sent securely. This paper shows that it is possible to select a key over open communications channels in such a fashion that communications security can be maintained. A method is described which forces any enemy to expend an amount of work which increases as the square of the work required of the two communicants to select the key. The method provides a logically new kind of protection against the passive eavesdropper. It suggests that further research on this topic will be highly rewarding, both in a theoretical and a practical sense.Keywords
This publication has 6 references indexed in Scilit:
- Hiding information and signatures in trapdoor knapsacksIEEE Transactions on Information Theory, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- The Wire-Tap ChannelBell System Technical Journal, 1975
- Cryptography and Computer PrivacyScientific American, 1973
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949