Abstract
We present a protocol for key exchange which relies on the existence of permutations which are not necessarily trap-door, and which are one-way in a weaker sense than that usually assumed in the literature. Our main result is that, under this assumption, two players can exchange a secret key over an open channel in such a way that an eavesdropper must spend time proportional to TIME · SPACE, where TIME is the time spent by the two players and SPACE is the amount of information which can be stored and transmitted by the two players. Hence the importance of storage technology for security.
Supported in part by NSF Grant Number CCR-8909657.
Chapter PDF
Similar content being viewed by others
References
J.L. Carter and M.N. Wegman. Universal classes of hash functions. Journal of Computer and System Sciences, 18(2):143–154, 1979.
G. Davida, Y. Desmedt, and R. Peralta. A key distribution system based on any one-way function. In Advances in Cryptology — proceedings of EUROCRYPT’ 89, Lecture Notes in Computer Science. Springer-Verlag, 1990. to appear.
M. E. Hellman. A cryptanalytic time-memory tradeoff. IEEE Tr. Inform. Theory, 26(4):401–406, July 1980.
Ralph Merkle. Secure communications over insecure channels. Communications of the ACM, 21(4):294–299, 1978.
J.-J. Quisquater and J.-P. Delescaille. Other cycling tests for DES. In C. Pomerance, editor, Advances in Cryptology, Proc. of Crypto’ 87 (Lecture Notes in Computer Science 293), pages 255–256. Springer-Verlag, 1988. Santa Barbara, California, U.S.A., August 16–20.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Davida, G., Desmedt, Y., Peralta, R. (1991). On the Importance of Memory Resources in the Security of Key Exchange Protocols. In: Damgård, I.B. (eds) Advances in Cryptology — EUROCRYPT ’90. EUROCRYPT 1990. Lecture Notes in Computer Science, vol 473. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46877-3_2
Download citation
DOI: https://doi.org/10.1007/3-540-46877-3_2
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-53587-4
Online ISBN: 978-3-540-46877-6
eBook Packages: Springer Book Archive