• DocumentCode
    564672
  • Title

    Secure Communications in the Presence of Pervasive Deceit

  • Author

    Simmons, Gustavus J.

  • Author_Institution
    Sandia National Laboratories
  • fYear
    1980
  • fDate
    14-16 April 1980
  • Firstpage
    84
  • Lastpage
    84
  • Abstract
    The functions of secrecy, identification of the transmitter and of authentication of messages, and combinations of these, are in principle all achievable using either symmetric or asymmetric cryptosystems. Since secure communications depend on authenticated data exchanges between and/or authenticated actions by some of the parties to the communication, the fundamentals of authentication using symmetric or asymmetric techniques are developed. The surprising conclusion is that they differ only in the secure exchanges required to achieve further secure communications. The problem of authenticating a public-key directory is discussed in the light of these findings.
  • Keywords
    Authentication; Communication systems; Encryption; Public key; Receivers; Transmitters;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security and Privacy, 1980 IEEE Symposium on
  • Conference_Location
    Oakland, CA, USA
  • ISSN
    1540-7993
  • Print_ISBN
    0-8186-0335-6
  • Type

    conf

  • DOI
    10.1109/SP.1980.10003
  • Filename
    6233706