Author_Institution :
RSA Lab., Redwood City, CA, USA
Abstract :
The author reviews encryption algorithms and standards, how they compare, how they differ, and where they are headed. Attention is given to secret-key cryptosystems, public-key cryptosystems, digital signature schemes, key-agreement algorithms, cryptographic hash functions, and authentication codes. Applications considered are secure electronic mail, secure communications, directory authentication and network management, banking, and escrowed encryption.<>
Keywords :
banking; codes; cryptography; electronic mail; file organisation; standards; authentication codes; banking; cryptographic hash functions; digital signature schemes; directory authentication; electronic mail; encryption standards; escrowed encryption; key-agreement algorithms; network management; public-key cryptosystems; secret-key cryptosystems; secure communications; Art; Authentication; Code standards; Data security; Digital signatures; Laboratories; Microcomputers; National security; Open systems; Public key cryptography;