REFERENCES

W. DIFFIE AND M. HELLMAN, “Multiuser Cryptographic Techniques,” National Computer Conference, New York, NY, 1976, pp. 109–112.

T. EL GAMAL, “A Public Key Cryptosystem and a Signature System Based on Discrete Logarithms, IEEE Transactions on Information Theory, IT-31, 469–472 (1985).

IBM, “Data Security Through Cryptography,” GC22-906209, IBM Corporation, 1977.

IBM, “IBM Cryptographic Subsystem Concepts and Facilities,” GC22-9063-04. IBM Corporation, 1985.

C. H. MEYER AND S. M. MATYAS, “Cryptography: A New Dimension of Data Security,” John Wiley & Sons, New York, NY, 1982.

ANSI, Financial Institution Key Management (Wholesale), American National Standards Institute, approved April 4, 1985.

M. E. HELLMAN, B. W. DIFFIE, AND R. C. MERKLE, U.S. Patent 4,200,770, “Cryptographic Apparatus and Method,” Filed September 6, 1977; Granted April 29, 1980.

R. M. NEEDHAM AND M. D. SCHROEDER, “Using Authentication for Authentication in Large Networks of Computers,” Communications of the ACM, 21, 993–999 (1978).

1Nonce, for used only once, is introduced as part of the authentication process.

2An improved Needham–Schroeder protocol modified the request message to (REQ, EK(ID[A]){REQ}) and included a time-stamp in addition to the nonce. In this case, the request message could only be constructed with knowledge of the key K(ID[A]).

Computer Security and Cryptography. By Alan G. KonheimCopyright © 2007 John Wiley & Sons, Inc.

Get Computer Security and Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.