scispace - formally typeset
Journal ArticleDOI

Timestamps in key distribution protocols

Dorothy E. Denning, +1 more
- 01 Aug 1981 - 
- Vol. 24, Iss: 8, pp 533-536
TLDR
It is shown that key distribution protocols with timestamps prevent replays of compromised keys and have the additional benefit of replacing a two-step handshake.
Abstract
The distribution of keys in a computer network using single key or public key encryption is discussed. We consider the possibility that communication keys may be compromised, and show that key distribution protocols with timestamps prevent replays of compromised keys. The timestamps have the additional benefit of replacing a two-step handshake.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Proceedings ArticleDOI

A logic of authentication

TL;DR: This paper describes the beliefs of trustworthy parties involved in authentication protocols and the evolution of these beliefs as a consequence of communication, and gives the results of the analysis of four published protocols.
Journal ArticleDOI

Kerberos: an authentication service for computer networks

TL;DR: The authors concentrate on authentication for real-time, interactive services that are offered on computer networks, which includes remote login, file system reads and writes, and information retrieval for applications like Mosaic.

The Kerberos Network Authentication Service (V5)

J. Kohl, +1 more
TL;DR: This document gives an overview and specification of Version 5 of the protocol for the Kerberos network authentication system, presently in production use at MIT's Project Athena, and at other Internet sites.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

Using encryption for authentication in large networks of computers

TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Proceedings ArticleDOI

Protocols for Public Key Cryptosystems

TL;DR: Several protocols for public key distribution and for digital signatures are briefly compared with each other and with the conventional alternative.
Journal ArticleDOI

Encryption and Secure Computer Networks

TL;DR: Key management, network encryption protocols, digital signatures, and the utility of conventional or public-key encryptlon methods are each discussed.
Journal ArticleDOI

Generation, distribution, and installation of cryptographic keys

S. M. Matyas, +1 more
- 01 Jun 1978 - 
TL;DR: This paper discusses possible key generation, distribution, and installation procedures for the key management scheme presented in the preceding paper.
Related Papers (5)