Entity Authentication Using Public Key Cryptography
暂无分享,去创建一个
Abstract : This standard specifies two challenge-response protocols by which entities in a computer system may authenticate their identities to one another. These may be used during session initiation, and at any other time that entity authentication is necessary. Depending on which protocol is implemented, either one or both entities involved may be authenticated. The defined protocols are derived from an international standard for entity authentication based on public key cryptography, which uses digital signatures and random number challenges.
[1] John Wray. Generic Security Service API : C-bindings , 1993, RFC.
[2] Carlisle M. Adams. The Simple Public-Key GSS-API Mechanism (SPKM) , 1996, RFC.
[3] John Linn,et al. Generic Security Service Application Program Interface , 1993, RFC.
[4] Nathaniel S. Borenstein,et al. MIME (Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies , 1992, RFC.