Abstract
In this paper we present a cryptographic scheme that allows to ensure the ongoing authenticity and security of connections in a computer network. This is achieved by combining a zero-knowledge authentication and a public key exchange protocol. It is noteworthy that due to the combination both protocols gain additional security against attacks that would otherwise be successful. The scheme is applicable to both local area networks and internetworks.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
F. Bauspieß: SELANE-SEcure Local Area Network Environment, Studienarbeit, Universität Karlsruhe, 1988
Th. Beth: Efficient Zero-Knowledge Identification Scheme for Smart Cards, Proc. of Eurocrypt’ 88, Springer LNCS 330, pp. 77–84, 1988
W. Diffie, M. Hellman: New Directions in Cryptography, IEEE Trans. on Information Theory, IT-22, pp. 644–654, 1976
Ch. Günther: Diffie-Hellman and El-Gamal protocols with one single authentication key, Proc. of Eurocrypt’ 89
R. Rueppel: Key Agreements based on Function Composition, Proc. of Eurocrypt’ 88, Springer LNCS 330, pp. 3–10, 1988
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bauspieß, F., Knobloch, HJ. (1990). How to Keep Authenticity Alive in a Computer Network. In: Quisquater, JJ., Vandewalle, J. (eds) Advances in Cryptology — EUROCRYPT ’89. EUROCRYPT 1989. Lecture Notes in Computer Science, vol 434. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46885-4_6
Download citation
DOI: https://doi.org/10.1007/3-540-46885-4_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-53433-4
Online ISBN: 978-3-540-46885-1
eBook Packages: Springer Book Archive