Key-Exchange in Real Quadratic Congruence Function Fields

  • Authors:
  • R. Scheidler;A. Stein;Hugh C. Williams

  • Affiliations:
  • Department of Mathematical Sciences, University of Delaware, Newark, DE 19716 U.S.A. scheidle@math.udel.edu;FB-9 Mathematik, Universität des Saarlandes, 66041 Saarbrücken, Germany andreas@math.uni-sb.de;Department of Computer Science, University of Manitoba, Winnipeg, MB, Canada R3T 2N2 hugh_williams@csmail.cs.umanitoba.ca

  • Venue:
  • Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
  • Year:
  • 1996

Quantified Score

Hi-index 0.00

Visualization

Abstract

We show how the theory of real quadratic congruence function fields can be used to produce a secure key distribution protocol. The technique is similar to that advocated by Diffie and Hellman in 1976, but instead of making use of a group for its underlying structure, makes use of a structure which is "almost" a group. The method is an extension of the recent ideas of Scheidler, Buchmann and Williams, but, because it is implemented in these function fields, several of the difficulties with their protocol can be eliminated. A detailed description of the protocol is provided, together with a discussion of the algorithms needed to effect it.