Authentication and Signature for Message Handling

  • Wyn L Price
Conference paper
Part of the NATO ASI Series book series (volume 6)


In many data communication applications it is desirable to be able to prove receipt and authenticity of a transmitted document. Encipherment techniques are available which make this possible. The paper gives an outline of the principles involved.


Assure Tocol 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    National Bureau of Standards. DES Modes of Operation. Federal Information Processing Standards Publication 81, 2 December 1980.Google Scholar
  2. 2.
    Lipton, S.M. & Matyas, S.M. Making the digital signature legal–and safeguarded. Data Communications, February 1978, pp. 41–52.Google Scholar
  3. 3.
    Diffie, W. & Hellman, M.E. New directions in cryptography. Trans. IEEE on Information Theory, IT-22, 6, November 1976, pp. 644–654.MathSciNetGoogle Scholar
  4. 4.
    Rivest, R.L., Shamir, A. & Adleman, L. A method of obtaining digital signatures and public-key cryptosystems. Comm. ACM, 21, 2, February 1978, pp. 120–126.MathSciNetMATHCrossRefGoogle Scholar
  5. 5.
    Davies, D.W. & Price, W.L. The application of digital signatures based on public key cryptosystems. Proc. 5th ICCC, Atlanta, Ga., October 1980, pp. 525–530.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1984

Authors and Affiliations

  • Wyn L Price
    • 1
  1. 1.Division of Information Technology and ComputingNational Physical LaboratoryTeddington MiddlesexUK

Personalised recommendations