Affiliation:
1. Purdue Univ., West Lafayette, IN
Abstract
The distribution of keys in a computer network using single key or public key encryption is discussed. We consider the possibility that communication keys may be compromised, and show that key distribution protocols with timestamps prevent replays of compromised keys. The timestamps have the additional benefit of replacing a two-step handshake.
Publisher
Association for Computing Machinery (ACM)
Reference8 articles.
1. Secure personal computing in an insecure network
2. New directions in cryptography
3. Konfelder L. M. A method for certification. Lab. for Computer Science MIT Cambridge Mass. (May 1978). Konfelder L. M. A method for certification. Lab. for Computer Science MIT Cambridge Mass. (May 1978).
4. Generation, distribution, and installation of cryptographic keys
Cited by
343 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献