authentication without public keys

Peter Rowell peter at thirdi.UUCP
Mon Nov 21 08:57:42 AEST 1988


For those interested in a paper on the subject, I heartily
recommend the following:

    Communications of the ACM
    December, 1978
    Volume 21, Number 12
    Pages 993-999

    "Using Encryption for Authentication
    in Large Networks of Computers."

    Roger M. Needham and	(Now at Cambridge (?))
    Michael D. Schroeder	(Now at DEC (?))
    Xerox PARC


The paper is clear and succinct.  It discusses the establishment
of secure communications using either public key or private key
methods.

----------------------------------------------------------------------
Peter Rowell
Third Eye Software, Inc.		(415) 321-0967
Menlo Park, CA  94025			peter at thirdi.UUCP



More information about the Comp.unix.wizards mailing list