Loading…

Using encryption for authentication in large networks of computers

Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional...

Full description

Saved in:
Bibliographic Details
Published in:Communications of the ACM 1978-12, Vol.21 (12), p.993-999
Main Authors: Needham, Roger M., Schroeder, Michael D.
Format: Magazinearticle
Language:English
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.
ISSN:0001-0782
1557-7317
DOI:10.1145/359657.359659