DocumentCode :
564672
Title :
Secure Communications in the Presence of Pervasive Deceit
Author :
Simmons, Gustavus J.
Author_Institution :
Sandia National Laboratories
fYear :
1980
fDate :
14-16 April 1980
Firstpage :
84
Lastpage :
84
Abstract :
The functions of secrecy, identification of the transmitter and of authentication of messages, and combinations of these, are in principle all achievable using either symmetric or asymmetric cryptosystems. Since secure communications depend on authenticated data exchanges between and/or authenticated actions by some of the parties to the communication, the fundamentals of authentication using symmetric or asymmetric techniques are developed. The surprising conclusion is that they differ only in the secure exchanges required to achieve further secure communications. The problem of authenticating a public-key directory is discussed in the light of these findings.
Keywords :
Authentication; Communication systems; Encryption; Public key; Receivers; Transmitters;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 1980 IEEE Symposium on
Conference_Location :
Oakland, CA, USA
ISSN :
1540-7993
Print_ISBN :
0-8186-0335-6
Type :
conf
DOI :
10.1109/SP.1980.10003
Filename :
6233706
Link To Document :
بازگشت