next_inactive up previous
Up: MA479 / CSSE479 Schedule Page

Key Agreement

Asymmetric Version

What is a key agreement system?

Protocol

Computational Requirements

  1. ``Easy'' to find r in $ \mathcal {R}$A (respectively $ \mathcal {R}$B) and compute u = fA(r) (respectively u = fB(r)) given r

  2. ``Easy'' to compute k = gA(r, u) (respectively k = gB(r, u)) given r and u

  3. ``Hard'' to compute r = fA-1(u) (respectively r = fB-1(u)) given only u

  4. ``Hard'' to compute k = gA(fA-1($ \alpha$),$ \beta$) = gB(fB-1($ \beta$),$ \alpha$) given only $ \alpha$ and $ \beta$

Symmetric version

What is a symmetric key agreement system?

Protocol

Computational Requirements

  1. ``Easy'' to find r in $ \mathcal {R}$ and compute u = f (r) given r

  2. ``Easy'' to compute k = g(r, u) given r and u

  3. ``Hard'' to compute f-1(r) given only u

  4. ``Hard'' to compute k = g(f-1($ \alpha$),$ \beta$) = g(f-1($ \beta$),$ \alpha$) given only $ \alpha$ and $ \beta$

About this document ...

Key Agreement

This document was generated using the LaTeX2HTML translator Version 2K.1beta (1.57)

Copyright © 1993, 1994, 1995, 1996, Nikos Drakos, Computer Based Learning Unit, University of Leeds.
Copyright © 1997, 1998, 1999, Ross Moore, Mathematics Department, Macquarie University, Sydney.

The command line arguments were:
latex2html -link 0 -split +0 -html_version 3.2,math key-agreement.tex

The translation was initiated by Joshua R Holden on 2004-04-25


next_inactive up previous
Up: MA479 / CSSE479 Schedule Page
Prof. Joshua Holden
Rose-Hulman Institute of Technology
Math 479 / CSSE 479, Spring 2003--2004
2004-04-25