Using Encryption for Authentication in Large Networks of Computers

Use of encryption to achieve authenticated
communication in computer networks is discussed. 
 Example protocols are presented for the establishment
of authenticated connections, for the management 
of authenticated mail, and for signature verification
and document integrity guarantee.  Both conventional 
and public-key encryption algorithms are considered as the basis for protocols.

CACM December, 1978

Needham, R.
Schroeder, M.

Encryption, security, authentication, networks, protocols,
public-key cryptosystems, data encryption 
standard

3.81 4.31 4.35

CA781201 DH January 22, 1979  11:18 AM

3038	4	3038
3111	4	3038
3177	4	3038
3021	5	3038
3038	5	3038
3038	5	3038
3038	5	3038
3158	5	3038
2436	6	3038
3038	6	3038
3111	6	3038