doi.org

Using encryption for authentication in large networks of computers | Communications of the ACM

  • ️SchroederMichael D.
  • ️Fri Dec 01 1978

Abstract

Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.

References

[1]

Branstad, D. Security aspects of computer networks, Proc. AIAA Comptr. Network Syst. Conf., April 1973, paper 73-427.

[2]

Branstad, D. Encryption protection in computer data communications. Proc. Fourth Data Communications Symp., Oct. 1975, pp. 8.1-8.7 (available from ACM, New York).

[3]

DiMe, W., and Hellman, M. Multiuser Cryptographic Techniques, Proc AFIPS 1976 NCC, AFIPS Press, Montvale, N.J., pp. 109-112.

[4]

Feistel, H. Cryptographic coding for data bank privacy. Res. Rep. RC2827, IBM T.J. Watson Res. Ctr., Yorktown Heights, N.Y., March 1970.

[5]

Kent, S. Encryption-based protection protocols for interactive user-computer communication, M.S. Th., EECS Dept., M.I.T., 1976; also available as Tech. Rep. 162, Lab. for Comptr. Sci., M.I.T., Cambridge, Mass., 1976.

[6]

Kent, S. Encryption-based protection for interactive user/ computer communication. Proc. Fifth Data Communication Symp., Sept. 1977, pp. 5-7-5-13 (available from ACM, New York).

[7]

National Bureau of Standards. Data Encryption Standard. Fed. Inform. Processing Standards Pub. 46, NBS, Washington, D.C., Jan. 1977.

[8]

Pohlig, S. Algebraic and combinatoric aspects of cryptography. Tech. Rep. No. 6602-1, Stanford Electron. Labs., Stanford, Calif., Oct. 1977.

[9]

Rivest, R.L., et al. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2 (Feb. 1978), 120-126.

Information & Contributors

Information

Published In

cover image Communications of the ACM

Communications of the ACM  Volume 21, Issue 12

Dec. 1978

89 pages

Copyright © 1978 ACM.

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 1978

Published in CACM Volume 21, Issue 12

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authentication
  2. data encryption standard
  3. encryption
  4. networks
  5. protocols
  6. public-key cryptosystems
  7. security

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)999
  • Downloads (Last 6 weeks)122

Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

  • Ullah SLi JChen JAli IKhan SHussain MUllah FLeung V(2025)Homomorphic Encryption Applications for IoT and Light-Weighted Environments: A ReviewIEEE Internet of Things Journal10.1109/JIOT.2024.347202912:2(1222-1246)Online publication date: 15-Jan-2025
  • Meadows C(2025)Formal Analysis of Cryptographic ProtocolsEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_876(952-954)Online publication date: 8-Jan-2025
  • Just MAdams C(2025)Needham–Schroeder ProtocolsEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_87(1626-1628)Online publication date: 8-Jan-2025
  • Lloyd SAdams C(2025)Key ManagementEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_85(1357-1363)Online publication date: 8-Jan-2025
  • Robshaw M(2025)One-Way FunctionEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_467(1731-1732)Online publication date: 8-Jan-2025
  • Kurosawa KDesmedt Y(2025)Hybrid EncryptionEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_321(1143-1148)Online publication date: 8-Jan-2025
  • Tiepelt MMartin CMaeurer N(2024)Post-Quantum Ready Key Agreement for AviationIACR Communications in Cryptology10.62056/aebn2isfgOnline publication date: 9-Apr-2024
  • Labinsky A(2024)FEATURES OF CRYPTOGRAPHIC PROTOCOLSNATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)10.61260/2307-7476-2024-1-53-592024:1(53-59)Online publication date: 17-Apr-2024
  • Shagam MRonen EBalzarotti DXu W(2024)Windows into the pastProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699272(6651-6668)Online publication date: 14-Aug-2024
  • Ouardi DBarkallah MJacquet J(2024)The B2Scala Tool: Integrating Bach in Scala with Security in MindElectronic Proceedings in Theoretical Computer Science10.4204/EPTCS.414.4414(58-76)Online publication date: 11-Dec-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

Figures

Tables

Media