Authentication and Signature for Message Handling
In many data communication applications it is desirable to be able to prove receipt and authenticity of a transmitted document. Encipherment techniques are available which make this possible. The paper gives an outline of the principles involved.
Unable to display preview. Download preview PDF.
- 1.National Bureau of Standards. DES Modes of Operation. Federal Information Processing Standards Publication 81, 2 December 1980.Google Scholar
- 2.Lipton, S.M. & Matyas, S.M. Making the digital signature legal–and safeguarded. Data Communications, February 1978, pp. 41–52.Google Scholar
- 5.Davies, D.W. & Price, W.L. The application of digital signatures based on public key cryptosystems. Proc. 5th ICCC, Atlanta, Ga., October 1980, pp. 525–530.Google Scholar