Abstract
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.
References
8
Referenced
1,476
- Branstad , D. Security aspects of computer networks , Proc. AIAA Comptr. Network Syst. Conf. , April 1973 , paper 73-427. Branstad, D. Security aspects of computer networks, Proc. AIAA Comptr. Network Syst. Conf., April 1973, paper 73-427. / Proc. AIAA Comptr. Network Syst. Conf. by Branstad D. (1973)
- Branstad , D. Encryption protection in computer data communications . Proc. Fourth Data Communications Symp. , Oct. 1975 , pp. 8.1 - 8.7 (available from ACM, New York). Branstad, D. Encryption protection in computer data communications. Proc. Fourth Data Communications Symp., Oct. 1975, pp. 8.1-8.7 (available from ACM, New York). / Proc. Fourth Data Communications Symp. by Branstad D. (1975)
- DiMe , W. , and Hellman , M . Multiuser Cryptographic Techniques , Proc AFIPS 1976 NCC, AFIPS Press, Montvale, N.J. , pp. 109 - 112 . DiMe, W., and Hellman, M. Multiuser Cryptographic Techniques, Proc AFIPS 1976 NCC, AFIPS Press, Montvale, N.J., pp. 109-112. / Proc AFIPS 1976 NCC, AFIPS Press, Montvale, N.J. by DiMe W.
- Feistel , H. Cryptographic coding for data bank privacy. Res. Rep. RC2827, IBM T.J. Watson Res. Ctr., Yorktown Heights, N.Y. , March 1970 . Feistel, H. Cryptographic coding for data bank privacy. Res. Rep. RC2827, IBM T.J. Watson Res. Ctr., Yorktown Heights, N.Y., March 1970. / Res. Rep. RC2827, IBM T.J. Watson Res. Ctr., Yorktown Heights, N.Y. by Feistel H. (1970)
- Kent , S. Encryption-based protection protocols for interactive user-computer communication, M.S. Th., EECS Dept., M.I.T., 1976; also available as Tech. Rep. 162, Lab. for Comptr. Sci., M.I.T., Cambridge , Mass. , 1976 . Kent, S. Encryption-based protection protocols for interactive user-computer communication, M.S. Th., EECS Dept., M.I.T., 1976; also available as Tech. Rep. 162, Lab. for Comptr. Sci., M.I.T., Cambridge, Mass., 1976. / Mass. by Kent S. (1976)
10.1145/800103.803345
- National Bureau of Standards. Data Encryption Standard. Fed. Inform. Processing Standards Pub. 46 , NBS , Washington , D.C. , Jan. 1977 . National Bureau of Standards. Data Encryption Standard. Fed. Inform. Processing Standards Pub. 46, NBS, Washington, D.C., Jan. 1977. / NBS by National Bureau of Standards. (1977)
10.1145/359340.359342
Dates
Type | When |
---|---|
Created | 23 years ago (July 27, 2002, 7:34 a.m.) |
Deposited | 2 months, 1 week ago (June 17, 2025, 12:48 p.m.) |
Indexed | 3 days, 8 hours ago (Aug. 23, 2025, 9:45 p.m.) |
Issued | 46 years, 8 months ago (Dec. 1, 1978) |
Published | 46 years, 8 months ago (Dec. 1, 1978) |
Published Online | 46 years, 8 months ago (Dec. 1, 1978) |
Published Print | 46 years, 8 months ago (Dec. 1, 1978) |
@article{Needham_1978, title={Using encryption for authentication in large networks of computers}, volume={21}, ISSN={1557-7317}, url={http://dx.doi.org/10.1145/359657.359659}, DOI={10.1145/359657.359659}, number={12}, journal={Communications of the ACM}, publisher={Association for Computing Machinery (ACM)}, author={Needham, Roger M. and Schroeder, Michael D.}, year={1978}, month=dec, pages={993–999} }