How to expose an eavesdropper
暂无分享,去创建一个
We present a new protocol for establishing secure communications over an insecure communications charmel in the absence of trusted third parties or authenticated keys. The protocol is an improvement over the simpler protocol in which the communicating parties exchanged their public encryption keys and used them to encrypt messages. It forces a potential eavesdropper--if he wants to understand the messages--to reveal his existence by modifying and seriously garbling the communication.
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.