Abuses in cryptography and how to fight them

31Citations
Citations of this article
40Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The following seems quite familiar: '‘Alice and Bob want to flip a coin by telephone. (They have just divorced, live in different countries, want to decide who will have the children during the nezt holiday.)… So they use [Blu82]j’s (OT an improved) protocol. However, Alice and Bob’s divorce has been set up to cover up their spying activities. W h e n they use [BluSZ]’s protocol, they don’t care if the ucoinflip’' is random, but they want to abuse the protocol to send secret information to each other. The counter-espionage service, however, doesn’t know that the divorce and the use o f the [Blu82]’s protocol are just cover-ups. In this paper, we demonstrate how several modern crypto-systems can be abused. We generalize [Sim83b]’s subliminal channel and [DGBS7]’s abuse of the [FFSB7, FS86] identification systems and demonstrate how one can prevent abuses of CTyptOsystems.

Cite

CITATION STYLE

APA

Desmedt, Y. (1990). Abuses in cryptography and how to fight them. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 403 LNCS, pp. 375–389). Springer Verlag. https://doi.org/10.1007/0-387-34799-2_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free