Method for transferring sensitive information using initially unsecured communication

作者: Sarvar Patel

DOI:

关键词: Public-key cryptographyInformation sensitivityEncryptionComputer securityBusinessWireless

摘要: In the method for transferring sensitive information using unsecured communication, a first party receives public key of second party, produces an encryption result by performing keyed on at least random number key, and transfers to over communication channel. The decrypts obtain number. Authorizing is then transferred from encrypted authenticated channel established Sensitive further if accepts authorizing information. Numerous applications exist system method, including wireless industry wherein mobile network.

参考文章(22)
Duane H Anderson, Selective lockout of computer memory ,(1962)
Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, Moti Yung, Systematic Design of Two-Party Authentication Protocols international cryptology conference. pp. 44- 61 ,(1991) , 10.1007/3-540-46766-1_3
Mihir Bellare, Phillip Rogaway, Entity authentication and key distribution international cryptology conference. pp. 232- 249 ,(1993) , 10.1007/3-540-48329-2_21
Oded Goldreich, Silvio Micali, Shafi Goldwasser, On the cryptographic applications of random functions international cryptology conference. pp. 276- 288 ,(1985)
Stefan Lucks, Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys international workshop on security. pp. 79- 90 ,(1997) , 10.1007/BFB0028161
C. Carroll, Y. Frankel, Y. Tsiounis, Efficient key distribution for slow computing devices: achieving fast over the air activation for wireless systems ieee symposium on security and privacy. pp. 66- 76 ,(1998) , 10.1109/SECPRI.1998.674824
Philip Andrew Treventi, James Alexander Reeds, Service provision authentication protocol ,(1992)