Transporting a Secret using Destructively-Read Memory

Christianson, Bruce and Shafarenko, Alex (2023) Transporting a Secret using Destructively-Read Memory. In: Security Protocols XXVIII :. Lecture Notes in Computer Science, 14186 . Springer Nature. ISBN 978-3-031-43032-9
Copy

Alice wants to send Bob a secret such as a one-time pad. Our proposal is to use a specially designed mass-produced memory chip, rather like a flash drive, called a DeRM (Destructive-Read Memory). As with other distribution methods, including tamper-evident containers and QKD, we require a side-channel that provides end-point authentication and message integrity (although not message secrecy). Advantages of the DeRM over other tamper-evident containers include that DeRMs can be clonable, and correct verification that the DeRM has not been accessed in transit is ensured by the process of extracting the secret content.


picture_as_pdf
DeRM_2.pdf
subject
Submitted Version
copyright
Available under Unspecified

View Download

Atom BibTeX OpenURL ContextObject in Span OpenURL ContextObject Dublin Core MPEG-21 DIDL EndNote HTML Citation METS MODS RIOXX2 XML Reference Manager Refer ASCII Citation
Export

Downloads