Crossref journal-article
Association for Computing Machinery (ACM)
Communications of the ACM (320)
Abstract

Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.

Bibliography

Needham, R. M., & Schroeder, M. D. (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12), 993–999.

Authors 2
  1. Roger M. Needham (first)
  2. Michael D. Schroeder (additional)
References 8 Referenced 1,476
  1. Branstad , D. Security aspects of computer networks , Proc. AIAA Comptr. Network Syst. Conf. , April 1973 , paper 73-427. Branstad, D. Security aspects of computer networks, Proc. AIAA Comptr. Network Syst. Conf., April 1973, paper 73-427. / Proc. AIAA Comptr. Network Syst. Conf. by Branstad D. (1973)
  2. Branstad , D. Encryption protection in computer data communications . Proc. Fourth Data Communications Symp. , Oct. 1975 , pp. 8.1 - 8.7 (available from ACM, New York). Branstad, D. Encryption protection in computer data communications. Proc. Fourth Data Communications Symp., Oct. 1975, pp. 8.1-8.7 (available from ACM, New York). / Proc. Fourth Data Communications Symp. by Branstad D. (1975)
  3. DiMe , W. , and Hellman , M . Multiuser Cryptographic Techniques , Proc AFIPS 1976 NCC, AFIPS Press, Montvale, N.J. , pp. 109 - 112 . DiMe, W., and Hellman, M. Multiuser Cryptographic Techniques, Proc AFIPS 1976 NCC, AFIPS Press, Montvale, N.J., pp. 109-112. / Proc AFIPS 1976 NCC, AFIPS Press, Montvale, N.J. by DiMe W.
  4. Feistel , H. Cryptographic coding for data bank privacy. Res. Rep. RC2827, IBM T.J. Watson Res. Ctr., Yorktown Heights, N.Y. , March 1970 . Feistel, H. Cryptographic coding for data bank privacy. Res. Rep. RC2827, IBM T.J. Watson Res. Ctr., Yorktown Heights, N.Y., March 1970. / Res. Rep. RC2827, IBM T.J. Watson Res. Ctr., Yorktown Heights, N.Y. by Feistel H. (1970)
  5. Kent , S. Encryption-based protection protocols for interactive user-computer communication, M.S. Th., EECS Dept., M.I.T., 1976; also available as Tech. Rep. 162, Lab. for Comptr. Sci., M.I.T., Cambridge , Mass. , 1976 . Kent, S. Encryption-based protection protocols for interactive user-computer communication, M.S. Th., EECS Dept., M.I.T., 1976; also available as Tech. Rep. 162, Lab. for Comptr. Sci., M.I.T., Cambridge, Mass., 1976. / Mass. by Kent S. (1976)
  6. 10.1145/800103.803345
  7. National Bureau of Standards. Data Encryption Standard. Fed. Inform. Processing Standards Pub. 46 , NBS , Washington , D.C. , Jan. 1977 . National Bureau of Standards. Data Encryption Standard. Fed. Inform. Processing Standards Pub. 46, NBS, Washington, D.C., Jan. 1977. / NBS by National Bureau of Standards. (1977)
  8. 10.1145/359340.359342
Dates
Type When
Created 23 years ago (July 27, 2002, 7:34 a.m.)
Deposited 2 months, 1 week ago (June 17, 2025, 12:48 p.m.)
Indexed 3 days, 8 hours ago (Aug. 23, 2025, 9:45 p.m.)
Issued 46 years, 8 months ago (Dec. 1, 1978)
Published 46 years, 8 months ago (Dec. 1, 1978)
Published Online 46 years, 8 months ago (Dec. 1, 1978)
Published Print 46 years, 8 months ago (Dec. 1, 1978)
Funders 0

None

@article{Needham_1978, title={Using encryption for authentication in large networks of computers}, volume={21}, ISSN={1557-7317}, url={http://dx.doi.org/10.1145/359657.359659}, DOI={10.1145/359657.359659}, number={12}, journal={Communications of the ACM}, publisher={Association for Computing Machinery (ACM)}, author={Needham, Roger M. and Schroeder, Michael D.}, year={1978}, month=dec, pages={993–999} }