Abstracts
both
of
them,
and the
delays
he is
forced
to
introduce
are likely
to
arouse suspicion.
The interlock protocol requires that,
at the
beginning
of each cycle, both
A and
B
are
ready
to
transmit mean-
ingful messages
(a
"full-duplex" communication
pat-
tern).
More common
is a
"half-duplex" mode
in
which
the parties alternate
in the
transmission
of
messages,
and where each message
may
depend upon
the mes-
sage just received from
the
other party.
In
this mode
of
operation,
it is
harder
to
expose
an
eavesdropper since
a message sent
by one
party must become decipherable
before
any
meaningful response
is
expected from
the
recipient
of the
message.
The
only
way an
eavesdrop-
per
can be
detected
in
this case
is by
timing
the
delay
between questions
and
answers.
If
a question takes
t
seconds
to
transmit
(at a
fixed Baud rate which cannot
be changed
by the
eavesdropper),
and if the
eavesdrop-
per
can
start translating
it
only when
the
transmission
is complete, (e.g., when
the
ciphertext
is
superen-
crypted
by a
temporary
key
which
is
revealed
at the
end
of the
transmission),
the the
translation adds
at
least
t
seconds
to the
transmission delay. This extra
delay
can be
detected
if the
question must
be
answered
not sooner than
s
seconds
and not
later than
s + t
seconds after
it has
been posed,
for
some fixed
but
arbitrary
s.
One mode
of
operation
in
which
the
existence
of an
eavesdropper cannot
be
exposed
is a
one-way commu-
nication
in
which
A
wants
to
send B
a
message
but
does
not expect
(or
cannot receive)
any
response.
It is
clear
that without having authenticated information about
A's
key or
exact transmission time,
the
translation
of
the ciphertext
by
C cannot
be
detected.
REFERENCES
1.
Diffie. W. and Hellman. M. New directions in cryptography. /£££
Trans.
Inf. Theory. (Nov. 1976).
2.
Rivest. R.. Shamir. A. and Adelman. L. A method for obtaining
digital signatures and public-key cryptosystems. Commun. ACM 21.
(Feb.
1978).
CR Categories and Subject Descriptors: C.2.0 (Computer-Communi-
cation Networks]: General—security and
protection
General Term: Security
Additional Key Words and Phrases: cryptography, cryptographic
protocols
Received 4/82: revised
10/83:
accepted 11/83
Author's Present Address: Ronald L. Rivest. Laboratory for Computer
Science. Massachusetts Institute of Technology. 545 Technology Square.
Cambridge. MA 02139: Adi Shamir. Applied Mathematics. The Weiz-
mann Institute of Science. Rehovot. Israel.
Permission to copy without fee all or part of this material is granted
provided that the copies are not made or distributed for direct commer-
cial advantage, the ACM copyright notice and the title ofthe publication
and its date appear, and notice is given that copying is by permission of
the Association for Computing Machinery. To copy otherwise, or to
republish. requires a fee and/or specific permission.
Abstracts from Other ACM Publications
ACM
Transactions on
Programming
Languages and Systems
April issue
Using Time Instead
of
Timeout
for
Fault-Tolerant Distributed
Systems
Leslie Lamport
A general method is described for implementing a distributed system
with any desired degree of fault-tolerance. Instead of relying upon ex-
plicit timeouts, processes execute a simj>ie clock-driven algorithm. Reli-
able clock synchronization and a solution to the Byzantine generals
problem are assumed.
For Correspondence: L. Lamport. Computer Science Laboratory. SRI In-
ternational. 333 Ravenswood Ave.. Menlo Park. CA 94025.
"Hoare Logic"
of
CSP,
and A il
That
Leslie Lamport
and
Fred B. Schneider
Ceneralized Hoare Logic is a formal logical system for deriving invari-
ance properties of programs. It provides a uniform way to describe a
variety of methods for reasoning about concurrent programs, including
noninterference, satisfaction, and cooperation proofs. We describe a sim-
ple meta-rule ofthe Generalized Hoare Logic—the Decomposition Prin-
ciple—and show how all these methods can be derived using it.
For Correspondence: L. Lamport. Computer Science Laboratory. SRI In-
ternational. 333 Ravenswood Ave.. Menlo Park. CA 94025.
Communicating Sequential Processes
for
Centraliied
and
Distributed Operating System Design
M.
Elizabeth C. Hull
and R. M.
McKeag
How the notation of Communicating Sequential Processes may bo used
in the design cf an operating system is demonstrated. Furthermore, how
such an approach assists in the design and development of a system
distributed over a network of computers is shown. The technique uses a
well-defined design methodology.
For Correspondence: M.E.C. Hull. School of Computer Science. Ulster
Polytechnic. Shore Road. Newtownabbey. Co Antrim BT37 OQB. North
Ireland.
Giobai Data Fiow Analysis Problems Arising
in
Locally Least-Cost
Error Recovery
Roland Backhouse
Locally least-cost error recovery is a technique for recovering from syn-
tax errors by editing the input string at the point of error detection. A
scheme for its implementation is recursive descent parsers, which in
principle embodies a process of passing a parameter to
each
procedure in
the parser for
each
terminal symbol in the grammar, has heen suggested.
For this scheme to be practical it is vital that as much parameterization
as possible is eliminated from tho recursive descent parser. This optimi-
zation problem and how it may be split into three separate global data
flow analysis problems—classifying terminal symbols and the so-called
min and max follow cost problems—are discussed. Tbe max follow cost
problem is a particularly difficult one to solve. Tho application of Gaus-
sian elimination to its solution is shown by expressing it as a continuous
data flow problem, and is also related to an "idiosyncratic" data flow
problem arising in the optimization of very high level languages. Classi-
fying terminal symbols is also difficult since the problem is unsolvable
in general. However, for the class of LL(1) grammars, the problem is
shown to be expressible as a distributive data flow problom and so may
be solved using, say. Gauss-Seidel iteration.
For Correspondence: R. Backhouse. Dept. of Computer Science. Univer-
sity of Essex. Wivenhoe Park. Colchester C04 3SQ. U.K.
Aprill984 Volume
27
Number
4
Communications
of the ACM 395