Using encryption for authentication in large networks of computers
Open Access
- 1 December 1978
- journal article
- research article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 21 (12), 993-999
- https://doi.org/10.1145/359657.359659
Abstract
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.Keywords
This publication has 2 references indexed in Scilit:
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- Encryption-based protection for interactive user/computer communicationPublished by Association for Computing Machinery (ACM) ,1977