authentication protocols
Ben Laurie
ben at algroup.co.uk
Fri Mar 29 09:34:54 EST 2002
John Saylor wrote:
>
> Hi
>
> I'd like to find an authentication protocol that fits my needs:
> 1. 2 [automated] parties
> 2. no trusted 3rd party intemediary ['Trent' in _Applied_Crypto_]
>
> Most of the stuff in _Applied_Crypto_ requires that third party. It may
> be an impossible task, nothing seems obvious to me. Pointers,
> suggestions, or aphorisms all welcome.
You need to specify what you are trying to achieve! For example, its
easy to avoid third parties if you have already exchanged keys.
Cheers,
Ben.
--
http://www.apache-ssl.org/ben.html http://www.thebunker.net/
"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com
More information about the cryptography
mailing list