van Oorschot, 2022 - Google Patents
Public key cryptography's impact on society: how Diffie and Hellman changed the worldvan Oorschot, 2022
View PDF- Document ID
- 14302380708910738569
- Author
- van Oorschot P
- Publication year
- Publication venue
- Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman
External Links
Snippet
In 1975 and 1976, Whitfield Diffie and Martin Hellman conceived and introduced fundamental new methods that changed how communications are secured. Their landmark paper “New Directions in Cryptography” explained both public key cryp tography and what …
- 238000000034 method 0 abstract description 11
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI840358B (en) | Computer-implemented systems and methods for using a blockchain to perform an atomic swap | |
US10536445B1 (en) | Discrete blockchain and blockchain communications | |
Ramana et al. | A three-level gateway protocol for secure m-commerce transactions using encrypted OTP | |
Majot et al. | Global catastrophic risk and security implications of quantum computers | |
Gkaniatsou et al. | Low-level attacks in bitcoin wallets | |
Islam et al. | A low-cost cross-border payment system based on auditable cryptocurrency with consortium blockchain: Joint digital currency | |
WO2019199813A2 (en) | Managed high integrity blockchain and blockchain communications that utilize containers | |
Tan et al. | Challenges of post-quantum digital signing in real-world applications: A survey | |
Skudnov | Bitcoin clients | |
Yang et al. | Enhanced digital rights management authentication scheme based on smart card | |
Wazid et al. | Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future Research | |
Dar et al. | Blockchain based secure data exchange between cloud networks and smart hand-held devices for use in smart cities | |
van Oorschot | Public key cryptography’s impact on society: how Diffie and Hellman changed the world | |
Sherin Beevi et al. | Blockchain Based Email Communication with SHA-256 Algorithm | |
Reddy et al. | Block Chain for Financial Application using IOT | |
Maram | Bitcoin generation using Blockchain technology | |
Mahmood et al. | A survey on privacy and policy aspects of blockchain technology | |
Slayton | Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman | |
van Oorschot | 1 Security Background | |
Lee et al. | An interactive mobile SMS confirmation method using secret sharing technique | |
Chen et al. | Reverse authentication in financial transactions and identity management | |
Yu et al. | A novel fair and verifiable data trading scheme | |
Di Pietro et al. | Cryptocurrencies | |
CN116132185B (en) | Data calling method, system, device, equipment and medium | |
Muthanna et al. | Cryptographic Algorithms to Secure IoT Devices: A Survey |