Using encryption for authentication in large networks of computers

@article{Needham1978UsingEF,
  title={Using encryption for authentication in large networks of computers},
  author={Roger M. Needham and Michael D. Schroeder},
  journal={Commun. ACM},
  year={1978},
  volume={21},
  pages={993-999}
}
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols. 
The use of Encryption in Kerberos for Network Authentication
TLDR
The design and implementation of the Kerberos authentication service was motivated by the fact that in a workstation environment, the user often has complete control over the worksta- tion. Expand
Authentication using cryptography
TLDR
The relationship between key distribution and entity authentication is described, and examples of practical authentication protocols are given, together with some of the pitfalls awaiting designers of such protocols. Expand
Design of Authentication and Key Management Protocols
Entity authentication and key management mechanisms using symmetric cryptographic algorithms are examined. The particular protocols of interest are currently being progressed through ISO/IECExpand
The Interrogator A Tool for Cryptographic Protocol Security
  • J. Millen
  • Computer Science
  • 1984 IEEE Symposium on Security and Privacy
  • 1984
TLDR
Computer networks employ encryption several purposes, including private communication, message authentication, and digital signatures, which depend not only on the strength the cryptographic algorithms, but also on the procedures for key management. Expand
Using one-way functions for authentication
TLDR
Techniques are suggested to construct authentication protocols on a basis of one-way functions rather than encryption algorithms, and it appears that this approach could achieve equally simple and capable protocols. Expand
Secure communication using remote procedure calls
TLDR
The design of an end-to-end secure protocols, built as part of a remote procedure call package, the security abstraction presented to users, the authentication mechanisms, and the protocol for encrypting and verifying remote calls are described. Expand
Analysis of Key Exchange Protocols using Session Keys
TLDR
This paper analyzes techniques of exchanging key through which encryption is performed to find which technique is best suitable for use in mobile computers with limited processing power and battery capacity while efficiently working on wireless networks. Expand
Scheme for Secure Digital Mobile Communications Based on Symmetric Key Cryptography
  • T. Hwang
  • Computer Science
  • Inf. Process. Lett.
  • 1993
TLDR
In the scheme user authentication as well as key distribution are provided simultaneously in the use of symmetric key cryptosystems, and can be easily implemented with hardware-limited terminals. Expand
Authentication of signatures using public key encryption
One of Needham and Schroeder's proposed signature authentication protocols is shown to fail when there is a possibility of compromised keys: this invalidates one of the applications of theirExpand
Authentication protocols using encryption techniques
TLDR
Several authentication protocols like public key authentication, Key hashing, Kerberos etc., will be discussed along with the attacks that are possible on those methods. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 10 REFERENCES
Encryption-based protection for interactive user/computer communication
This paper develops a virtual connection model, complete with intruder, for interactive terminal-host communication and presents a set of protection goals that characterize the security that can beExpand
ENCRYPTION-BASED PROTECTION PROTOCOLS FOR INTERACTIVE USER-COMPUTER COMMUNICATION
TLDR
This thesis develops a complete set of protocols, which utilize a block cipher, e.g., the NBS data encryption standard, for protection interactive user-computer communication over physically unsecured channels, and discusses the results of a test implementation of the modules on Multics. Expand
Multiuser cryptographic techniques
TLDR
It is shown how such a public key cryptosystem would allow the development of an authentication system which generates an unforgeable, message dependent digital signature. Expand
A method for obtaining digital signatures and public-key cryptosystems
TLDR
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys. Expand
Algebraic and combinatoric aspects of cryptography
  • Tech. Rep. No. 6602-1,
  • 1977
Data Encryption Standard. Fed. Inform. Processing Standards Pub
  • Data Encryption Standard. Fed. Inform. Processing Standards Pub
  • 1977
Security aspects of computer networks
  • Proc. AIAA Comptr. Network Syst. Conf., April
  • 1973
Cryptographic coding for data bank privacy
  • Res. Rep. RC2827, IBM T.J. Watson Res. Ctr., Yorktown Heights,
  • 1970
Security aspects of computer networks , Proc . AIAA Comptr