Timestamps in Key Distribution Protocols

462Citations
Citations of this article
88Readers
Mendeley users who have this article in their library.

Abstract

The distribution of keys in a computer network using single key or public key encryption is discussed. We consider the possibility that communication keys may be compromised, and show that key distribution protocols with timestamps prevent replays of compromised keys. The timestamps have the additional benefit of replacing a two-step handshake. © 1981, ACM. All rights reserved.

Cite

CITATION STYLE

APA

Denning, D. E., & Sacco, G. M. (1981). Timestamps in Key Distribution Protocols. Communications of the ACM, 24(8), 533–536. https://doi.org/10.1145/358722.358740

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free