On receiving a request for a log-in … the host … [sends] a random 64-bit number, called a nonce, … it is convenient for a part … of this number to represent the time at … his/her identity and a password. The password is … [56-bit] DES key. … The resulting key is used to encrypt the … [Using its tables, the host decrypts the nonce.] If this results in the original nonce, then the authentication … claims to be. … [p. 441] The security of the strong key database … [on the host] …
Google-1
Google-2
Copyright clearance needed for quotation.