Jump to ContentJump to Main Navigation
The Golden TicketP, NP, and the Search for the Impossible$
Users without a subscription are not able to see the full content.

Lance Fortnow

Print publication date: 2017

Print ISBN-13: 9780691175782

Published to Princeton Scholarship Online: May 2018

DOI: 10.23943/princeton/9780691175782.001.0001

Show Summary Details
Page of

PRINTED FROM PRINCETON SCHOLARSHIP ONLINE (www.princeton.universitypressscholarship.com). (c) Copyright Princeton University Press, 2019. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in PRSO for personal use.date: 19 September 2019

Secrets

Secrets

Chapter:
(p.123) Chapter 8 Secrets
Source:
The Golden Ticket
Author(s):

Lance Fortnow

Publisher:
Princeton University Press
DOI:10.23943/princeton/9780691175782.003.0008

This chapter analyzes how, in 1976, Whitfield Diffie and Martin Hellman suggested that one could use NP to hide one's own secrets. The field of cryptography, the study of secret messages, changed forever. Diffie and Hellman, building on earlier work of Roger Merkle, proposed a method to get around the problem of network security using what they called “public-key” cryptography. A computer would generate two keys, a public key and a private key. The computer would store the private key, never putting that key on the network. The public key would be sent over the network broadcast to everyone. Diffie and Hellman's idea was to develop a cryptosystem that used the public key for encrypting messages, turning the real message into a coded one. The public key would not be able to decrypt the message. Only the private key could decrypt the message.

Keywords:   Whitfield Diffie, Martin Hellman, cryptography, secret messages, network security, public-key cryptography, cryptosystem, encryption, decryption

Princeton Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us.