Unconventional cryptographic keying variable management
JE Hershey, AA Hassan… - IEEE Transactions on …, 1995 - ieeexplore.ieee.org
JE Hershey, AA Hassan, R Yarlagadda
IEEE Transactions on Communications, 1995•ieeexplore.ieee.orgWe present three unconventional approaches to keying variable management. The first
approach is based on using a public key cryptosystem (PKC) that is breakable in short, but
on average less, time than it takes to set up an ultrawide bandwidth modem that is then used
to transport a keying variable for a classical cryptosystem. The second concept proposes
using the characteristics of an urban UHF radio channel, determined by mutual sounding, as
the cryptovariable. The third concept encourages research into ill-conditioned problems as …
approach is based on using a public key cryptosystem (PKC) that is breakable in short, but
on average less, time than it takes to set up an ultrawide bandwidth modem that is then used
to transport a keying variable for a classical cryptosystem. The second concept proposes
using the characteristics of an urban UHF radio channel, determined by mutual sounding, as
the cryptovariable. The third concept encourages research into ill-conditioned problems as …
We present three unconventional approaches to keying variable management. The first approach is based on using a public key cryptosystem (PKC) that is breakable in short, but on average less, time than it takes to set up an ultrawide bandwidth modem that is then used to transport a keying variable for a classical cryptosystem. The second concept proposes using the characteristics of an urban UHF radio channel, determined by mutual sounding, as the cryptovariable. The third concept encourages research into ill-conditioned problems as potentially fruitful ground for PKCs not based on finite field arithmetic.< >
ieeexplore.ieee.org