0
|
1 % run this through PhD-TeX
|
|
2
|
|
3 \input dcustom
|
|
4 \articlestyle
|
|
5 \input version
|
|
6
|
|
7 \def\appendix#1#2{\dosection{Appendix #1: #2}}
|
|
8
|
|
9 \def\draftext{%
|
|
10 \begingroup
|
|
11 \eightpoint\sf
|
|
12 Reprinted from
|
|
13 {\it Proceedings, Second International Symposium on Computer Message
|
|
14 Systems},
|
|
15 {\oldstyle 1985}%
|
|
16 \endgroup
|
|
17 }
|
|
18 \catcode`\@=11
|
|
19 \def\draftstring{%
|
|
20 \ifnum\pageno>\z@
|
|
21 \begingroup
|
|
22 \eightpoint\sf
|
|
23 Copyright $\copyright$ {\oldstyle 1985},
|
|
24 IFIP TC-6
|
|
25 \endgroup
|
|
26 \fi
|
|
27 }
|
|
28 \def\uci@footpage{\draftstring\hfil\rm\folio}
|
|
29 \catcode`\@=12
|
|
30
|
|
31 \input sfwmac
|
|
32 \def\CKD/{{\sf CKD}}
|
|
33 \def\CSM/{{\sf CSM}}
|
|
34 \def\KDC/{{\sf KDC}}
|
|
35 \def\KDS/{{\sf KDS}}
|
|
36 \def\MTA/{{\sf MTA}}
|
|
37 \def\MTS/{{\sf MTS}}
|
|
38 \def\TMA/{{\sf TMA}}
|
|
39 \def\TTI/{{\sl TTI\/}}
|
|
40 \def\UA/{{\sf UA}}
|
|
41
|
|
42 \def\itemm$#1${\item{$#1\/$:}}
|
|
43
|
|
44 \header
|
|
45 Design of the TTI Prototype\\
|
|
46 Trusted Mail Agent\title
|
|
47 Marshall T.~Rose$^\dagger$\\
|
|
48 David J.~Farber\\
|
|
49 Stephen T.~Walker\author\info
|
|
50 \footnote{}{\hskip -\parindent
|
|
51 $^\dagger$ All three authors are with Trusted Technologies, Incorporated,
|
|
52 POB~45, Glenwood,~MD~21738, USA.
|
|
53 Telephone: 301/854--6889.
|
|
54 In addition, Professor Farber is with the University of Delaware.}
|
|
55
|
|
56 \centerline{\sc Abstract}
|
|
57 {\rightskip=0pt\narrower\narrower
|
|
58 \noindent
|
|
59 The design of the \TTI/ prototype Trusted Mail Agent (\TMA/) is discussed.
|
|
60 This agent interfaces between two entities:
|
|
61 a key distribution center (\KDC/) and a user agent (\UA/).
|
|
62 The \KDC/ manages keys for the encryption of text messages,
|
|
63 which two subscribers to a key distribution service (\KDS/) may exchange.
|
|
64 The \TMA/ is independent of any underlying message transport system.
|
|
65
|
|
66 \lp
|
|
67 Subscribers to the \KDC/ are known by unique identifiers,
|
|
68 known as IDs.
|
|
69 In addition to distributing keys,
|
|
70 the \KDC/ also offers a simple directory lookup service,
|
|
71 in which the ``real-world'' name of a subscriber may be mapped to an ID,
|
|
72 or the inverse mapping may be performed.
|
|
73
|
|
74 \lp
|
|
75 This document details three software components:
|
|
76 \underbar{first},
|
|
77 a prototype key distribution service,
|
|
78 which has been running in a TCP/IP environment since December, 1984;
|
|
79 \underbar{second},
|
|
80 a prototype trusted mail agent;
|
|
81 and,
|
|
82 \underbar{third},
|
|
83 modifications to an existing \UA/,
|
|
84 the Rand \MH/ Message Handling system,
|
|
85 which permit interaction with the prototype \TMA/.
|
|
86 \par}
|
|
87
|
|
88 \input text
|
|
89 \input refs
|
|
90 \input appendixA
|
|
91 \input appendixB
|
|
92 \input appendixC
|
|
93 \printcontents
|
|
94 \unskip\footnote{}{\hskip -\parskip This document (version \versiontag/)
|
|
95 was \TeX set \today\ with DISS.STY v\version.}
|
|
96 \showsummary
|
|
97
|
|
98 \bye
|