Using encryption for authentication in large networks of computers | Communications of the ACM
- ️SchroederMichael D.
- ️Fri Dec 01 1978
Abstract
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.
References
[1]
Branstad, D. Security aspects of computer networks, Proc. AIAA Comptr. Network Syst. Conf., April 1973, paper 73-427.
[2]
Branstad, D. Encryption protection in computer data communications. Proc. Fourth Data Communications Symp., Oct. 1975, pp. 8.1-8.7 (available from ACM, New York).
[3]
DiMe, W., and Hellman, M. Multiuser Cryptographic Techniques, Proc AFIPS 1976 NCC, AFIPS Press, Montvale, N.J., pp. 109-112.
[4]
Feistel, H. Cryptographic coding for data bank privacy. Res. Rep. RC2827, IBM T.J. Watson Res. Ctr., Yorktown Heights, N.Y., March 1970.
[5]
Kent, S. Encryption-based protection protocols for interactive user-computer communication, M.S. Th., EECS Dept., M.I.T., 1976; also available as Tech. Rep. 162, Lab. for Comptr. Sci., M.I.T., Cambridge, Mass., 1976.
[6]
Kent, S. Encryption-based protection for interactive user/ computer communication. Proc. Fifth Data Communication Symp., Sept. 1977, pp. 5-7-5-13 (available from ACM, New York).
[7]
National Bureau of Standards. Data Encryption Standard. Fed. Inform. Processing Standards Pub. 46, NBS, Washington, D.C., Jan. 1977.
[8]
Pohlig, S. Algebraic and combinatoric aspects of cryptography. Tech. Rep. No. 6602-1, Stanford Electron. Labs., Stanford, Calif., Oct. 1977.
[9]
Rivest, R.L., et al. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2 (Feb. 1978), 120-126.
Information & Contributors
Information
Published In
Communications of the ACM Volume 21, Issue 12
Dec. 1978
89 pages
Copyright © 1978 ACM.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Published: 01 December 1978
Published in CACM Volume 21, Issue 12
Permissions
Request permissions for this article.
Check for updates
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- Downloads (Last 12 months)999
- Downloads (Last 6 weeks)122
Reflects downloads up to 20 Feb 2025
Other Metrics
Citations
- Ullah SLi JChen JAli IKhan SHussain MUllah FLeung V(2025)Homomorphic Encryption Applications for IoT and Light-Weighted Environments: A ReviewIEEE Internet of Things Journal10.1109/JIOT.2024.347202912:2(1222-1246)Online publication date: 15-Jan-2025
- Meadows C(2025)Formal Analysis of Cryptographic ProtocolsEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_876(952-954)Online publication date: 8-Jan-2025
- Just MAdams C(2025)Needham–Schroeder ProtocolsEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_87(1626-1628)Online publication date: 8-Jan-2025
- Lloyd SAdams C(2025)Key ManagementEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_85(1357-1363)Online publication date: 8-Jan-2025
- Robshaw M(2025)One-Way FunctionEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_467(1731-1732)Online publication date: 8-Jan-2025
- Kurosawa KDesmedt Y(2025)Hybrid EncryptionEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_321(1143-1148)Online publication date: 8-Jan-2025
- Tiepelt MMartin CMaeurer N(2024)Post-Quantum Ready Key Agreement for AviationIACR Communications in Cryptology10.62056/aebn2isfgOnline publication date: 9-Apr-2024
- Labinsky A(2024)FEATURES OF CRYPTOGRAPHIC PROTOCOLSNATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS)10.61260/2307-7476-2024-1-53-592024:1(53-59)Online publication date: 17-Apr-2024
- Shagam MRonen EBalzarotti DXu W(2024)Windows into the pastProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699272(6651-6668)Online publication date: 14-Aug-2024
- Ouardi DBarkallah MJacquet J(2024)The B2Scala Tool: Integrating Bach in Scala with Security in MindElectronic Proceedings in Theoretical Computer Science10.4204/EPTCS.414.4414(58-76)Online publication date: 11-Dec-2024
- Show More Cited By
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.