USING ENCRYPTION FOR AUTHENTICATION IN LARGE NETWORKS OF COMPUTERS

被引:1020
作者
NEEDHAM, RM [1 ]
SCHROEDER, MD [1 ]
机构
[1] XEROX CORP,PALO ALTO RES CTR,PALO ALTO,CA 94304
关键词
authentication; data encryption standard; encryption; networks; protocols; public-key cryptosystems; security;
D O I
10.1145/359657.359659
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols. © 1978, ACM. All rights reserved.
引用
收藏
页码:993 / 999
页数:7
相关论文
共 9 条
  • [1] BRANSTAD D, 1973, APR P AIAA COMPTR NE
  • [2] BRANSTAD DK, 1975, 4TH P DAT COMM S
  • [3] DIFFIE W, 1976, 1976 P AFIPS NCC, P109
  • [4] FEISTEL H, 1970, RC2827 IBM TJ WATS R
  • [5] KENT S, 1976, 162 LAB COMPTR SCI M
  • [6] KENT S, 1977, 5TH P DAT COMM S
  • [7] POHLIG S, 1977, 66021 STANF EL LABS
  • [8] RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]
  • [9] 1977, NBS46 DAT ENCR STAND