Académique Documents
Professionnel Documents
Culture Documents
news
Profile | DOI:10.1145/2911979
Neil Savage
12
The researchers
work started to
move the field of
cryptography into
the realm of
academia and the
commercial world.
| J U NE 201 6 | VO L . 5 9 | NO. 6
news
JU N E 2 0 1 6 | VO L. 59 | N O. 6 | C OM M U N IC AT ION S OF T HE ACM
13
news
and makes one public; then a sender
can use that public key to encrypt a
message, but only the person with the
private key, which does not have to be
sent anywhere, can decrypt it.
Hellman compares it to a box with
two combination locks, one to lock
the box and the other to unlock it. Alice, the sender, and Bob, the receiver,
each generate a pair of keys and make
one public. Alice puts a message in the
box, then locks it with her secret key,
guaranteeing its authenticity since
only she knows how to do that. She
then places that locked box inside a
larger one, which she locks with Bobs
public key. When Bob gets the box, he
uses his private key to get past the outer box, and Alices public key to open
the inner box and see the message.
Hellman and Diffie, building on
an approach developed by Merkle,
later came up with a variation on the
scheme now called the Diffie-Hellman Key Exchange (though Hellman
argues Merkles name should be on
it as well). In this version, the box
has a hasp big enough for two locks.
Alice places her message in the box
and locks it with a lock to which only
she knows the combination, then
Cryptography has
really blossomed
since the publication
of their paper.
Its become
the key tool of
the information age.
COMMUNICATIO NS O F TH E AC M
| J U NE 201 6 | VO L . 5 9 | NO. 6