ABSTRACT

Previous discussions of both symmetric-key and public-key cryp-

tographic algorithms have focused on encryption and decryption.

Such operations provide the confidentiality security service. How-

ever, other cryptographic components are required if security ser-

vices such as data integrity, message authentication, and non-

repudiation are also to be provided.