[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

van Oorschot, 2022 - Google Patents

Public key cryptography's impact on society: how Diffie and Hellman changed the world

van Oorschot, 2022

View PDF
Document ID
14302380708910738569
Author
van Oorschot P
Publication year
Publication venue
Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman

External Links

Snippet

In 1975 and 1976, Whitfield Diffie and Martin Hellman conceived and introduced fundamental new methods that changed how communications are secured. Their landmark paper “New Directions in Cryptography” explained both public key cryp tography and what …
Continue reading at www.scs.carleton.ca (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Similar Documents

Publication Publication Date Title
TWI840358B (en) Computer-implemented systems and methods for using a blockchain to perform an atomic swap
US10536445B1 (en) Discrete blockchain and blockchain communications
Ramana et al. A three-level gateway protocol for secure m-commerce transactions using encrypted OTP
Majot et al. Global catastrophic risk and security implications of quantum computers
Gkaniatsou et al. Low-level attacks in bitcoin wallets
Islam et al. A low-cost cross-border payment system based on auditable cryptocurrency with consortium blockchain: Joint digital currency
WO2019199813A2 (en) Managed high integrity blockchain and blockchain communications that utilize containers
Tan et al. Challenges of post-quantum digital signing in real-world applications: A survey
Skudnov Bitcoin clients
Yang et al. Enhanced digital rights management authentication scheme based on smart card
Wazid et al. Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future Research
Dar et al. Blockchain based secure data exchange between cloud networks and smart hand-held devices for use in smart cities
van Oorschot Public key cryptography’s impact on society: how Diffie and Hellman changed the world
Sherin Beevi et al. Blockchain Based Email Communication with SHA-256 Algorithm
Reddy et al. Block Chain for Financial Application using IOT
Maram Bitcoin generation using Blockchain technology
Mahmood et al. A survey on privacy and policy aspects of blockchain technology
Slayton Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman
van Oorschot 1 Security Background
Lee et al. An interactive mobile SMS confirmation method using secret sharing technique
Chen et al. Reverse authentication in financial transactions and identity management
Yu et al. A novel fair and verifiable data trading scheme
Di Pietro et al. Cryptocurrencies
CN116132185B (en) Data calling method, system, device, equipment and medium
Muthanna et al. Cryptographic Algorithms to Secure IoT Devices: A Survey