@Article{RS84, author = { Ronald L. Rivest and Adi Shamir }, title = { How to expose an eavesdropper }, acm = { 99309 }, journal = { CACM }, issn = { 0001-0782 }, OPTyear = { 1984 }, OPTmonth = { April }, date = { 1984-04 }, volume = { 27 }, number = { 4 }, pages = { 393--395 }, url = { http://doi.acm.org/10.1145/358027.358053 }, doi = { 10.1145/358027.358053 }, acmid = { 358053 }, publisher = { ACM }, keywords = { cryptographic protocols, cryptography }, abstract = { We present a new protocol for establishing secure communications over an insecure communications channel in the absence of trusted third parties or authenticated keys. The protocol is an improvement over the simpler protocol in which the communicating parties exchanged their public encryption keys and used them to encrypt messages. It forces a potential eavesdropper---if he wants to understand the messages---to reveal his existence by modifying and seriously garbling the communication. }, }