Skip to main content
Log in

All sail, no anchor II: Acceptable high-end PKI

  • Regular contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

The conflict between accepted modern cryptographic approaches to digital signatures and the venerable traditions of the law of signatures and the law of contracts has been well expounded over the last few years. During this year, hardware progress in public-key encryption has made it possible largely to bridge the gap between these two realms. This paper shows one way to do so. This is a promising time for cryptographic work on digital signatures, as well as for joint legal/cryptographic consideration of outstanding signature issues.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Blakley B, Blakley GR (1978) Security of public key cryptosystems against random attack. Part 1, Cryptologia 2(4):305–321, Part 2, Cryptologia 3(1):29–42, Part 3, Cryptologia 3(2):205–118

  2. Blakley B, Blakley GR (2000) All sail, no anchor, I: Cryptography, Risk, and e-Commerce. In: Dawson E, Clark A, Boyd C (eds) Information security and privacy, Proceedings, ACISP 2000. Lecture notes in computer science, vol 1841. Springer, Berlin Heidelberg New York, pp 471–476

  3. Brickell EF (1990) A survey of hardware implementations of RSA In: Brassard G (ed) Advances in cryptology: Crypto 89. Lecture notes in computer science, vol 435. Springer, Berlin Heidelberg New York, pp 368–370

  4. Davida GI (1982) Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem. Technical Report TR-CS-82-2, Department of Electrical Engineering and Computer Science, University of Wiusconsin, Milwaukee, WI

  5. Davies DW, Price, WL (1980) The application of digital signatures based on public-key cryptosystems. Proceedings of the 5th International Computer Communications Conference, October 1980, pp 530–535

  6. Denning DER (1983) Cryptography and data security. Addison-Wesley, Reading, MA

  7. Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Transactions on Information Theory IT-22, pp 644–654

  8. Hart PE, Liu Z (2003) Trust in the preservation of digital information. Communications of the ACM 44(6):93–97

    Article  Google Scholar 

  9. McCullagh AJ (2001) The incorporation of trust strategies in digital signature regimes. PhD thesis, ISRC, Queensland University of Technology, Australia

  10. Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21:120–126

    Article  MathSciNet  Google Scholar 

  11. Rivest RL (1991) The MD4 message digest algorithm. In: Menezes AJ, Vanstone SA (eds) Advances in cryptology: Crypto 90. Lecture notes in computer science, vol 537. Springer, Berlin Heidelberg New York, pp 303–311

  12. Shamir A, Tromer E (2003) Factoring large numbers with the TWIRL device. In: Boneh D (ed) Advances in cryptology: Crypto 03. Lecture notes in computer science, vol 2729. Springer, Berlin Heidelberg New York, pp 1–26

  13. Stinson DR (2002) Cryptography: Theory and practice, 2nd ed. Chapman & Hall/CRC, Boca Raton, Florida

  14. Wildstrom SH (2003) Technology & you, just click on the dotted line. Business Week, 2 June 2003, p 18

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Blakley.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Blakley, B., Blakley, G. All sail, no anchor II: Acceptable high-end PKI. IJIS 2, 66–77 (2004). https://doi.org/10.1007/s10207-003-0029-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-003-0029-1

Keywords

Navigation