Secure Information Transfer Using Two Keyless Cryptography Methods
2021 ◽
Vol 7
(4)
◽
pp. 119-127
Keyword(s):
In the current paper, some methods of information security protocols based on physical layer security are considered. It is proved that well known Shamir’s protocol can be applied to RSA cryptosystem but not to Rabin, Mac-Ellice and trellis based cryptosystems.The main stream of this paper is a description of key sharing protocol on constant public and noiseless channels (like Internet). It is shown that it is able to provide a high reliability and control of security in terms of Shannon’s information providing nothing-additional requirements to communication channels and without any cryptographic assumptions.
2015 ◽
Keyword(s):
2013 ◽
Vol 464
◽
pp. 253-257
2012 ◽
Vol 214
◽
pp. 177-182
Keyword(s):
2012 ◽
Vol 479-481
◽
pp. 1476-1480
2017 ◽
Vol 41
(5)
◽
pp. 709-742
◽
2015 ◽
Vol 14
(4)
◽
pp. 5621-5631
Keyword(s):