Abstract
Alice wants to send Bob a secret such as a one-time pad. Our proposal is to use a specially designed mass-produced memory chip, rather like a flash drive, called a DeRM (Destructive-Read Memory). As with other distribution methods, including tamper-evident containers and QKD, we require a side-channel that provides end-point authentication and message integrity (although not message secrecy). Advantages of the DeRM over other tamper-evident containers include that DeRMs can be clonable, and correct verification that the DeRM has not been accessed in transit is ensured by the process of extracting the secret content.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Christianson, B., Shafarenko, A.: Vintage bit cryptography. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2006. LNCS, vol. 5087, pp. 261–265. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04904-0_34
Christianson, B., Shafarenko, A., Stajano, F., Wong, F.L.: Relay-proof channels using UWB lasers. In: Christianson, B., Malcolm, J. (eds.) Security Protocols 2010. LNCS, vol. 7061, pp. 45–46. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45921-8_8
Miller, F.: Telegraphic Code to Insure Privacy and Secrecy in the Transmission of Telegrams. Charles M. Cornwell, New York (1882). https://books.google.com/books?id=jNf2GwAACAAJ
Ryan, P.Y.A., Christianson, B.: Enhancements to prepare-and-measure based QKD protocols. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J., Bonneau, J. (eds.) Security Protocols 2013. LNCS, vol. 8263, pp. 123–133. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41717-7_14
Stajano, F., Wong, F.-L., Christianson, B.: Multichannel protocols to prevent relay attacks. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 4–19. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14577-3_4
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Christianson, B., Shafarenko, A. (2023). Transporting a Secret Using Destructively-Read Memory. In: Stajano, F., Matyáš, V., Christianson, B., Anderson, J. (eds) Security Protocols XXVIII. Security Protocols 2023. Lecture Notes in Computer Science, vol 14186. Springer, Cham. https://doi.org/10.1007/978-3-031-43033-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-43033-6_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-43032-9
Online ISBN: 978-3-031-43033-6
eBook Packages: Computer ScienceComputer Science (R0)