翻訳と辞書
Words near each other
・ Threespot barb
・ Three-lined salamander
・ Three-lobed Burning Eye
・ Three-lobed suckermouth
・ Three-Man Chess
・ Three-martini lunch
・ Three-mile laws
・ Three-mile limit
・ Three-minute pop song
・ Three-minute warning
・ Three-mirror anastigmat
・ Three-Nations Research Institute
・ Three-North Shelter Forest Program
・ Three-pane interface
・ Three-part lesson
Three-pass protocol
・ Three-peat
・ Three-phase
・ Three-phase AC railway electrification
・ Three-phase commit protocol
・ Three-phase electric power
・ Three-phase firing
・ Three-phase micro-inverter
・ Three-phase traffic theory
・ Three-piece
・ Three-player chess
・ Three-Point Contest
・ Three-point cross
・ Three-point estimation
・ Three-point field goal


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Three-pass protocol : ウィキペディア英語版
Three-pass protocol
In cryptography, the three-pass protocol for sending messages is a framework which allows one party to securely send a message to a second party without the need to exchange or distribute encryption keys. This message protocol should not be confused with various other algorithms which use 3 passes for authentication.
It is called the ''three-pass protocol'' because the sender and the receiver exchange three encrypted messages. The first three-pass protocol was developed by Adi Shamir circa 1980, and is described in more detail in a later section. The basic concept of the Three-Pass Protocol is that each party has a private encryption key and a private decryption key. The two parties use their keys independently, first to encrypt the message, and then to decrypt the message.
The protocol uses an encryption function ''E'' and a decryption function ''D''. The encryption function uses an encryption key ''e'' to change a plaintext message ''m'' into an encrypted message, or ciphertext, ''E(e,m)''. Corresponding to each encryption key ''e'' there is a decryption key ''d'' which allows the message to be recovered using the decryption function, ''D(d,E(e,m))=m''. Sometimes the encryption function and decryption function are the same.
In order for the encryption function and decryption function to be suitable for the ''Three-Pass Protocol'' they must have the property that for any message ''m'', any encryption key ''e'' with corresponding decryption key ''d'' and any independent encryption key ''k'',  ''D(d,E(k,E(e,m))) = E(k,m)''. In other words, it must be possible to remove the first encryption with the key ''e'' even though a second encryption with the key ''k'' has been performed. This will always be possible with a commutative encryption. A commutative encryption is an encryption that is order-independent, i.e. it satisfies ''E(a,E(b,m))=E(b,E(a,m))'' for all encryption keys ''a'' and ''b'' and all messages ''m''. Commutative encryptions satisfy ''D(d,E(k,E(e,m))) = D(d,E(e,E(k,m))) = E(k,m)''.
The Three-Pass Protocol works as follows:
# The sender chooses a private encryption key ''s'' and a corresponding decryption key ''t''. The sender encrypts the message ''m'' with the key ''s'' and sends the encrypted message ''E(s,m)'' to the receiver.
# The receiver chooses a private encryption key ''r'' and a corresponding decryption key ''q'' and super-encrypts the first message ''E(s,m)'' with the key ''r'' and sends the doubly encrypted message ''E(r,E(s,m))'' back to the sender.
# The sender decrypts the second message with the key ''t''. Because of the commutativity property described above ''D(t,E(r,E(s,m)))=E(r,m)'' which is the message encrypted with only the receiver's private key. The sender sends this to the receiver.
The receiver can now decrypt the message using the key ''q'', namely ''D(q,E(r,m))=m'' the original message.
Notice that all of the operations involving the sender's private keys ''s'' and ''t'' are performed by the sender, and all of the operations involving the receiver's private keys ''r'' and ''q'' are performed by the receiver, so that neither party needs to know the other party's keys.
== Shamir three-pass protocol ==

The first Three-Pass Protocol was the Shamir Three-Pass Protocol developed circa in 1980. It is also called the ''Shamir No-Key Protocol'' because the sender and the receiver do not exchange any keys, however the protocol requires the sender and receiver to have two private keys for encrypting and decrypting messages. The Shamir algorithm uses exponentiation modulo a large prime as both the encryption and decryption functions. That is ''E''(''e'',''m'') = ''m''''e'' mod ''p'' and ''D''(''d'',''m'') = ''m''''d'' mod ''p'' where ''p'' is a large prime. For any encryption exponent ''e'' in the range 1..''p''-1 with gcd(''e'',''p''-1) = 1. The corresponding decryption exponent ''d'' is chosen such that ''de'' ≡ 1 (mod ''p''-1). It follows from Fermat's Little Theorem that ''D''(''d'',''E''(''e'',''m'')) = ''m''''de'' mod ''p'' = ''m''.
The Shamir protocol has the desired commutativity property since ''E''(''a'',''E''(''b'',''m'')) = ''m''''ab'' mod ''p'' = ''m''''ba'' mod ''p'' = ''E''(''b'',''E''(''a'',''m'')).

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Three-pass protocol」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.