Authentication and Signature for Message Handling

  • Wyn L Price
Part of the NATO ASI Series book series (volume 6)


In many data communication applications it is desirable to be able to prove receipt and authenticity of a transmitted document. Encipherment techniques are available which make this possible. The paper gives an outline of the principles involved.


Secret Parameter Federal Information Processing Standard Message Handling Message Numbering Plaintext Message 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    National Bureau of Standards. DES Modes of Operation. Federal Information Processing Standards Publication 81, 2 December 1980.Google Scholar
  2. 2.
    Lipton, S.M. & Matyas, S.M. Making the digital signature legal–and safeguarded. Data Communications, February 1978, pp. 41–52.Google Scholar
  3. 3.
    Diffie, W. & Hellman, M.E. New directions in cryptography. Trans. IEEE on Information Theory, IT-22, 6, November 1976, pp. 644–654.MathSciNetGoogle Scholar
  4. 4.
    Rivest, R.L., Shamir, A. & Adleman, L. A method of obtaining digital signatures and public-key cryptosystems. Comm. ACM, 21, 2, February 1978, pp. 120–126.MathSciNetMATHCrossRefGoogle Scholar
  5. 5.
    Davies, D.W. & Price, W.L. The application of digital signatures based on public key cryptosystems. Proc. 5th ICCC, Atlanta, Ga., October 1980, pp. 525–530.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1984

Authors and Affiliations

  • Wyn L Price
    • 1
  1. 1.Division of Information Technology and ComputingNational Physical LaboratoryTeddington MiddlesexUK

Personalised recommendations