Fred C. Piper
Website
Genre
* Note: these are all the books on Goodreads for this author. To add more, click here.
“In this simplistic example we have to admit that the sender has no way of knowing whose padlock is on the briefcase and that it might be possible for an adversary to impersonate the receiver and place their padlock on the briefcase. This is a problem that has to be addressed. The ‘Whose padlock is it?’ question in this briefcase example is similar to the ‘Whose public key is it?’ question that is so important when public key systems are used.”
― Cryptography: A Very Short Introduction
― Cryptography: A Very Short Introduction
“Step 1: The sender places the present in the briefcase, which they lock with their padlock and remove their key. They then send the locked briefcase to the receiver. Note: While the briefcase is en route from sender to receiver, it is safe from all adversaries, because they cannot remove the padlock from the briefcase. However, the receiver is also unable to obtain the present. Step 2: The receiver locks the briefcase with their own padlock and removes the key. They then return it to the sender. Note: The briefcase is now locked with two padlocks so no one can get the present. Step 3: The sender uses their own key to remove their padlock from the briefcase and returns the briefcase to the receiver. Note: The only lock on the briefcase belongs to the receiver. Step 4: The receiver removes their padlock from the briefcase to obtain the present.”
― Cryptography: A Very Short Introduction
― Cryptography: A Very Short Introduction
Is this you? Let us know. If not, help out and invite Fred to Goodreads.