DocumentCode
564672
Title
Secure Communications in the Presence of Pervasive Deceit
Author
Simmons, Gustavus J.
Author_Institution
Sandia National Laboratories
fYear
1980
fDate
14-16 April 1980
Firstpage
84
Lastpage
84
Abstract
The functions of secrecy, identification of the transmitter and of authentication of messages, and combinations of these, are in principle all achievable using either symmetric or asymmetric cryptosystems. Since secure communications depend on authenticated data exchanges between and/or authenticated actions by some of the parties to the communication, the fundamentals of authentication using symmetric or asymmetric techniques are developed. The surprising conclusion is that they differ only in the secure exchanges required to achieve further secure communications. The problem of authenticating a public-key directory is discussed in the light of these findings.
Keywords
Authentication; Communication systems; Encryption; Public key; Receivers; Transmitters;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Privacy, 1980 IEEE Symposium on
Conference_Location
Oakland, CA, USA
ISSN
1540-7993
Print_ISBN
0-8186-0335-6
Type
conf
DOI
10.1109/SP.1980.10003
Filename
6233706
Link To Document