Using encryption for authentication in large networks of computers

@article{Needham1978UsingEF,
  title={Using encryption for authentication in large networks of computers},
  author={Roger M. Needham and Michael D. Schroeder},
  journal={Commun. ACM},
  year={1978},
  volume={21},
  pages={993-999}
}
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols. 
The use of Encryption in Kerberos for Network Authentication
TLDR
The design and implementation of the Kerberos authentication service was motivated by the fact that in a workstation environment, the user often has complete control over the worksta- tion.
Authentication using cryptography
Design of Authentication and Key Management Protocols
TLDR
New principles for the design of secure authentication mechanisms are developed and several protocols supplied in the standards proposals are found to have security aws and other shortcomings.
The Interrogator A Tool for Cryptographic Protocol Security
  • J. Millen
  • Computer Science, Mathematics
    1984 IEEE Symposium on Security and Privacy
  • 1984
TLDR
Computer networks employ encryption several purposes, including private communication, message authentication, and digital signatures, which depend not only on the strength the cryptographic algorithms, but also on the procedures for key management.
Using one-way functions for authentication
  • L. Gong
  • Computer Science, Mathematics
    CCRV
  • 1989
TLDR
Techniques are suggested to construct authentication protocols on a basis of one-way functions rather than encryption algorithms, and it appears that this approach could achieve equally simple and capable protocols.
Secure communication using remote procedure calls
TLDR
The design of an end-to-end secure protocols, built as part of a remote procedure call package, the security abstraction presented to users, the authentication mechanisms, and the protocol for encrypting and verifying remote calls are described.
Analysis of Key Exchange Protocols using Session Keys
TLDR
This paper analyzes techniques of exchanging key through which encryption is performed to find which technique is best suitable for use in mobile computers with limited processing power and battery capacity while efficiently working on wireless networks.
Scheme for Secure Digital Mobile Communications Based on Symmetric Key Cryptography
  • T. Hwang
  • Computer Science, Mathematics
    Inf. Process. Lett.
  • 1993
Authentication of signatures using public key encryption
One of Needham and Schroeder's proposed signature authentication protocols is shown to fail when there is a possibility of compromised keys: this invalidates one of the applications of their
Authentication protocols using encryption techniques
TLDR
Several authentication protocols like public key authentication, Key hashing, Kerberos etc., will be discussed along with the attacks that are possible on those methods.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 10 REFERENCES
Encryption-based protection for interactive user/computer communication
  • S. Kent
  • Computer Science
    SIGCOMM
  • 1977
This paper develops a virtual connection model, complete with intruder, for interactive terminal-host communication and presents a set of protection goals that characterize the security that can be
ENCRYPTION-BASED PROTECTION PROTOCOLS FOR INTERACTIVE USER-COMPUTER COMMUNICATION
TLDR
This thesis develops a complete set of protocols, which utilize a block cipher, e.g., the NBS data encryption standard, for protection interactive user-computer communication over physically unsecured channels, and discusses the results of a test implementation of the modules on Multics.
Multiuser cryptographic techniques
TLDR
It is shown how such a public key cryptosystem would allow the development of an authentication system which generates an unforgeable, message dependent digital signature.
A method for obtaining digital signatures and public-key cryptosystems
TLDR
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys.
Algebraic and combinatoric aspects of cryptography
  • Tech. Rep. No. 6602-1,
  • 1977
Data Encryption Standard. Fed. Inform. Processing Standards Pub
  • Data Encryption Standard. Fed. Inform. Processing Standards Pub
  • 1977
Security aspects of computer networks
  • Proc. AIAA Comptr. Network Syst. Conf., April
  • 1973
Cryptographic coding for data bank privacy
  • Res. Rep. RC2827, IBM T.J. Watson Res. Ctr., Yorktown Heights,
  • 1970
Security aspects of computer networks , Proc . AIAA Comptr