Loading…
Using encryption for authentication in large networks of computers
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional...
Saved in:
Published in: | Communications of the ACM 1978-12, Vol.21 (12), p.993-999 |
---|---|
Main Authors: | , |
Format: | Magazinearticle |
Language: | English |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols. |
---|---|
ISSN: | 0001-0782 1557-7317 |
DOI: | 10.1145/359657.359659 |