Using Encryption for Authentication in Large Networks of Computers Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols. CACM December, 1978 Needham, R. Schroeder, M. Encryption, security, authentication, networks, protocols, public-key cryptosystems, data encryption standard 3.81 4.31 4.35 CA781201 DH January 22, 1979 11:18 AM 3038 4 3038 3111 4 3038 3177 4 3038 3021 5 3038 3038 5 3038 3038 5 3038 3038 5 3038 3158 5 3038 2436 6 3038 3038 6 3038 3111 6 3038