Using encryption for authentication in large networks of computers
暂无分享,去创建一个
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.
[1] Encryption Protection in Computer Data Communications , 1975 .
[2] Whitfield Diffie,et al. Multiuser cryptographic techniques , 1976, AFIPS '76.
[3] S. Kent. ENCRYPTION-BASED PROTECTION PROTOCOLS FOR INTERACTIVE USER-COMPUTER COMMUNICATION , 1976 .
[4] Stephen Thomas Kent. Encryption-based protection for interactive user/computer communication , 1977 .
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.