scispace - formally typeset
Journal ArticleDOI

Protocols for Data Security

DeMillo, +1 more
- 01 Feb 1983 - 
- Vol. 16, Iss: 2, pp 39-51
TLDR
The methods the authors will describe in this article require the participants to execute communications algorithms, called protocols, which must maintain the properties that Alice and Bob's protocol must maintain in order to guard against cheating by either side.
Abstract
Aice lives in Atlanta and Bob lives in Detroit. They have never met, but they vvish to play poker. After some negotiation, they decide to play cards over the telephone. The first problem that arises is how to deal the cards fairly. If, for instance, Bob deals to Alice, how will Alice know that Bob has not cheated? On the other hand, if Bob manages to somehow deal a fair hand to Alice, without looking at her cards, what wvill stop Alice from changing her hand to a more favorable one? The problem confronting Alice and Bob is very similar to problems confronting users of modern communications systems such as electronic funds transfer systems, military communication networks, and distributed database systems. Such systems operate by series of message exchanges, and the possibility always exists that one or more of the participants in the exchanges will cheat to gain some advantage, or that some external agent will interfere w\\ith normal communications. Security in this context refers to the ability of such a system to withstand attacks by determined cheaters or enemies. Although other methods have been proposed for withstanding such attacksk. the methods we will describe in this article require the participants to execute communications algorithms, called protocols. W'hat are the properties that Alice and Bob's protocol must maintain in order to guard against cheating by either side? The card game they play should have rules just like the ordinary game of poker, except that no cards are actually exchanged. Alice and Bob must know the cards in their own hand, but neither can have any information about the other's hand. The deal must distribute all possible hands w'ith equal probability and should not allow the same card to appear in two hands simultaneously. A player should be able to discard from his own Can two mutually suspicious participants play poker over the telephone? Certainly, if they are clever enough to institute a secure protocol.

read more

Citations
More filters
Proceedings ArticleDOI

Encrypted key exchange: password-based protocols secure against dictionary attacks

TL;DR: A combination of asymmetric (public-key) and symmetric (secret- key) cryptography that allow two parties sharing a common password to exchange confidential and authenticated information over an insecure network is introduced.
Book

Modern Cryptography: Theory and Practice

Wenbo Mao
TL;DR: This book explains why "textbook crypto" is only good in an ideal world where data are random and bad guys behave nicely, and reveals the general unfitness of "textbooks crypto" for the real world by demonstrating numerous attacks on such schemes, protocols and systems under various real-world application scenarios.
Proceedings ArticleDOI

Optimistic protocols for fair exchange

TL;DR: A generic protocol for fair exchange of electronic goods with non-repudiation that does not involve a third party in the exchange in the fault-less case but only for recovery.
Patent

Simultaneous electronic transactions with visible trusted parties

Silvio Micali
TL;DR: In this paper, a number of electronic communications methods are described involving a first party and a second party, with assistance from at least a trusted party (T), enabling electronic transactions in which the first party (A) has a message for the second party (B).
Journal ArticleDOI

A Survey of Man In The Middle Attacks

TL;DR: This paper extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

Password authentication with insecure communication

TL;DR: A method of user password authentication is described which is secure even if an intruder can read the system's data, and can tamper with or eavesdrop on the communication between the user and the system.
Journal ArticleDOI

Using encryption for authentication in large networks of computers

TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Related Papers (5)