Abstract
The use of cryptography to produce a secure method of user authentication and to encipher traffic on data or digital links has been the aim of many of those defining theoretical schemes and techniques. This paper describes an experimental realisation of these aims in hardware, in order to provide a secure and authenticated communications channel.
Chapter PDF
Similar content being viewed by others
References
B-Crypt Specification, BT Cryptographic Products, June 1984.
‘Data Encryption Standard’, National Bureau of Standards, FIPS PUB 46, 1977.
Rivest, R L, Shamir, A, and Adleman, L, “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”, Comm. ACM, 1978, 21, Pp 120–126.
Davies, D W, Price, W L, and Parkin, G I, “Evaluation of Public Key Cryptosystems”, Information Privacy, 1980, 2, Pp 138–154.
Schanning, B P, “Applying Public Key Distribution to Local Area Networks”, Computers and Security, 1982, 1, Pp 268–274.
Ingemarsson, I, “A Conference Key Distribution System”, IEEE Trans, Inf. Theory, 1982, IT-28, Pp 714–720.
American National Standard X9.9, “Financial Institution Message Authentication”.
‘DataKey’ Handbook, DataCard International, drayton House, Chichester, Sussex, March 1983.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1985 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Serpell, S.C., Brookson, C.B., Clark, B.L. (1985). A Prototype Encryption System Using Public Key. In: Blakley, G.R., Chaum, D. (eds) Advances in Cryptology. CRYPTO 1984. Lecture Notes in Computer Science, vol 196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39568-7_1
Download citation
DOI: https://doi.org/10.1007/3-540-39568-7_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-15658-1
Online ISBN: 978-3-540-39568-3
eBook Packages: Springer Book Archive