Advertisement
Guest User

Untitled

a guest
May 20th, 2015
337
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.60 KB | None | 0 0
  1. Avoiding key distribution seems logically
  2. impossible — surely, if Alice wants to lock something in a box
  3. so that only Bob can open it, she must give him a copy of the
  4. key. Or, in terms of cryptography, if Alice wants to encipher a
  5. message so that only Bob can decipher it, she must give him a
  6. copy of the key. Key exchange is an inevitable part of enci-
  7. pherment — or is it?
  8.  
  9. Now picture the following situation. As before, Alice wants
  10. to send an intensely personal message to Bob. Again, she puts
  11. her secret message in an iron box, padlocks it and sends it to
  12. Bob. When the box arrives, Bob adds his own padlock and
  13. sends the box back to Alice. When Alice receives the box, it is
  14. now secured by two padlocks. She removes her own padlock,
  15. leaving just Bob's padlock to secure the box. Finally she sends
  16. the box back to Bob. And here is the crucial difference: Bob
  17. can now open the box, because it is secured only with his own
  18. padlock, to which he alone has the key.
  19.  
  20. The implications of this little story are enormous. It demon-
  21. strates that a secret message can be securely exchanged be-
  22. tween two people without necessarily exchanging a key. For the
  23. first time there is some hope that key exchange might not be
  24. an inevitable part of cryptography. We can reinterpret the story
  25. in terms of encryption. Alice uses her own key to encrypt a
  26. message to Bob, who encrypts it again with his own key and
  27. returns it. When Alice receives the doubly encrypted message,
  28. she removes her own encryption and returns it to Bob, who can
  29. then remove his own encryption and read the message.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement