ABSTRACT
Previous discussions of both symmetric-key and public-key cryp-
tographic algorithms have focused on encryption and decryption.
Such operations provide the confidentiality security service. How-
ever, other cryptographic components are required if security ser-
vices such as data integrity, message authentication, and non-
repudiation are also to be provided.