Integrating the Data Encryption Standard into Computer Networks
Open Access
- 1 June 1981
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Communications
- Vol. 29 (6) , 762-772
- https://doi.org/10.1109/tcom.1981.1095071
Abstract
The NBS Data Encryption Standard may be integrated into computer networks to protect personal (nonshared) files, to communicate securely both on- and off-line with local and remote users, to protect against key substitution, to authenticate system users, to authenticate data, and to provide digital signatures using a nonpublic key encryption algorithm. Key notarization facilities give users the capability of exercising a set of commands for key management as well as for data encryption functions. The facilities perform notarization which, upon encryption, seals a key or password with the identities of the transmitter and intended receiver. Thus, in order to decrypt a message, the receiver must authenticate himself and supply the correct identity of the transmitter. This feature eliminates the threat of key substitution which must be protected against to attain a high level of security.Keywords
This publication has 6 references indexed in Scilit:
- Secure personal computing in an insecure networkCommunications of the ACM, 1979
- Digital signatures — An overviewComputer Networks (1976), 1979
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- A cryptographic key management scheme for implementing the Data Encryption StandardIBM Systems Journal, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976