A Prototype Encryption System Using Public Key

  • S C Serpell
  • C B Brookson
  • B L Clark
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 196)


The use of cryptography to produce a secure method of user authentication and to encipher traffic on data or digital links has been the aim of many of those defining theoretical schemes and techniques. This paper describes an experimental realisation of these aims in hardware, in order to provide a secure and authenticated communications channel.


  1. 1.
    B-Crypt Specification, BT Cryptographic Products, June 1984.Google Scholar
  2. 2.
    ‘Data Encryption Standard’, National Bureau of Standards, FIPS PUB 46, 1977.Google Scholar
  3. 3.
    Rivest, R L, Shamir, A, and Adleman, L, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”, Comm. ACM, 1978, 21, Pp 120–126.zbMATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    Davies, D W, Price, W L, and Parkin, G I, “Evaluation of Public Key Cryptosystems”, Information Privacy, 1980, 2, Pp 138–154.Google Scholar
  5. 5.
    Schanning, B P, “Applying Public Key Distribution to Local Area Networks”, Computers and Security, 1982, 1, Pp 268–274.CrossRefGoogle Scholar
  6. 6.
    Ingemarsson, I, “A Conference Key Distribution System”, IEEE Trans, Inf. Theory, 1982, IT-28, Pp 714–720.CrossRefMathSciNetGoogle Scholar
  7. 7.
    American National Standard X9.9, “Financial Institution Message Authentication”.Google Scholar
  8. 8.
    ‘DataKey’ Handbook, DataCard International, drayton House, Chichester, Sussex, March 1983.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1985

Authors and Affiliations

  • S C Serpell
    • 1
  • C B Brookson
    • 1
  • B L Clark
    • 1
  1. 1.British Telecom Research LaboratoriesMartlesham HeathIpswich, SuffolkUK

Personalised recommendations