On the importance of memory resources in the security of key exchange protocols

1Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We present a protocol for key exchange which relies on the existence of permutations which are not necessarily trap-door, and which are one-way in a weaker sense than that usually assumed in the literature. Our main result is that, under this assumption, two players can exchange a secret key over an open channel in such a way that an eavesdropper must spend time proportional to TIME · SPACE, where TIME is the time spent by the two players and SPACE is the amount of information which cau be stored and transmitted by the two players. Hence the importance of storage technology for security.

Cite

CITATION STYLE

APA

Davida, G., Desmedt, Y., & Peralta, R. (1991). On the importance of memory resources in the security of key exchange protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 473 LNCS, pp. 11–15). Springer Verlag. https://doi.org/10.1007/3-540-46877-3_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free