Using Encryption for Authentication in Large Networks of Computers

Needham and Schroeder

Goals

I won't go into details about the specific protocols; the important things here are the concepts used. I urge you to know where you can find a copy of a good reference such as Applied Cryptography (2nd ed.); my personal copy tends to hang around 445 Soda.