Presentation 2002/6/14
A Method of Private Key Exchange Suitable for the Perfect Classified Communication
Hiroaki Nishi,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Demand of a safe communication is increasing rapidly with the progress of IP communications and systems such as distributed storage systems. With this background, it is now important to realize a "perfect classification" for the safe exchange of data, which disables the monitoring of, not only the contents of information, but also the control information like its address. To realize this, this report proposes a method of private key exchange. This method is based on the principle of commutative law and uses a double locking technique without introducing any public key. This method requires only a small hardware addition and even makes it difficult to probe a line or to monitor the CRT image through the electromagnetic noise generated from its cable.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Private keys exchange / Perfect data security / Certification
Paper # DC2002-14
Date of Issue

Conference Information
Committee DC
Conference Date 2002/6/14(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Vice Chair

Paper Information
Registration To Dependable Computing (DC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Method of Private Key Exchange Suitable for the Perfect Classified Communication
Sub Title (in English)
Keyword(1) Private keys exchange
Keyword(2) Perfect data security
Keyword(3) Certification
1st Author's Name Hiroaki Nishi
1st Author's Affiliation Network Platform Research Dept. Hitachi, Ltd., Central Research Laboratory()
Date 2002/6/14
Paper # DC2002-14
Volume (vol) vol.102
Number (no) 138
Page pp.pp.-
#Pages 6
Date of Issue