Key Exchange Using Keyless Cryptography
Permanent Link(s)
Collections
Author
Alpern, Bowen
Schneider, Fred B.
Abstract
Protocols to generate and distribute secret keys in a computer network are described. They are based on keyless cryptography, a new cryptographic technique where information is hidden by keeping only the originator of a message, and not its contents, secret.
Date Issued
1982-08
Publisher
Cornell University
Keywords
Previously Published as
http://techreports.library.cornell.edu:8081/Dienst/UI/1.0/Display/cul.cs/TR82-513
Type
technical report