Abstract
The distribution of keys in a computer network using single key or public key encryption is discussed. We consider the possibility that communication keys may be compromised, and show that key distribution protocols with timestamps prevent replays of compromised keys. The timestamps have the additional benefit of replacing a two-step handshake. © 1981, ACM. All rights reserved.
Author supplied keywords
Cite
CITATION STYLE
APA
Denning, D. E., & Sacco, G. M. (1981). Timestamps in Key Distribution Protocols. Communications of the ACM, 24(8), 533–536. https://doi.org/10.1145/358722.358740
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.
Already have an account? Sign in
Sign up for free