authentication protocols

Ben Laurie ben at algroup.co.uk
Fri Mar 29 09:34:54 EST 2002


John Saylor wrote:
> 
> Hi
> 
> I'd like to find an authentication protocol that fits my needs:
> 1. 2 [automated] parties
> 2. no trusted 3rd party intemediary ['Trent' in _Applied_Crypto_]
> 
> Most of the stuff in _Applied_Crypto_ requires that third party. It may
> be an impossible task, nothing seems obvious to me. Pointers,
> suggestions, or aphorisms all welcome.

You need to specify what you are trying to achieve! For example, its
easy to avoid third parties if you have already exchanged keys.

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com



More information about the cryptography mailing list