Using Encryption for Authentication in Large Networks of Computers.
- Resource Type
- Article
- Authors
- Needham, Roger M.; Schroeder, Michael D.; Gaines, R. Stockton
- Source
- Communications of the ACM. Dec1978, Vol. 21 Issue 12, p993-999. 7p.
- Subject
- *DATA encryption
*COMPUTER security
*COMPUTER network security
*DATA transmission systems
*DIGITAL communications
*COMPUTERS
- Language
- ISSN
- 0001-0782
Use of encryption to achieve authenticated communication In computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mall, and for signature verification and document Integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols. [ABSTRACT FROM AUTHOR]