Key-exchange in real quadratic congruence function fields
- Cite this article as:
- Scheidler, R., Stein, A. & Williams, H.C. Des Codes Crypt (1996) 7: 153. doi:10.1007/BF00125081
- 23 Downloads
We show how the theory of real quadratic congruence function fields can be used to produce a secure key distribution protocol. The technique is similar to that advocated by Diffie and Hellman in 1976, but instead of making use of a group for its underlying structure, makes use of a structure which is “almost” a group. The method is an extension of the recent ideas of Scheidler, Buchmann and Williams, but, because it is implemented in these function fields, several of the difficulties with their protocol can be eliminated. A detailed description of the protocol is provided, together with a discussion of the algorithms needed to effect it.