[10660] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: authentication protocols

daemon@ATHENA.MIT.EDU (bear)
Fri Mar 29 16:23:51 2002

Date: Thu, 28 Mar 2002 16:07:06 -0800 (PST)
From: bear <bear@sonic.net>
To: John Saylor <johns@worldwinner.com>
Cc: cryptography@wasabisystems.com
In-Reply-To: <20020325181404.D18079@johns.worldwinner.com>
Message-ID: <Pine.LNX.4.40.0203281552300.3169-100000@newbolt.sonic.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII






On Mon, 25 Mar 2002, John Saylor wrote:

>I'd like to find an authentication protocol that fits my needs:
>1. 2 [automated] parties
>2. no trusted 3rd party intemediary ['Trent' in _Applied_Crypto_]

"Authentication" relative to what?

All identity, and therefore all authentication, derives from
some kind of consensus idea of who a person is.  With no third
party, it is hard to check a consensus.

Usually authentication comes down to checking a credential. But
that implies some third party that issued the credential.

So, the pertinent question becomes, what is identity? For purposes
of your application, I mean -- no point to go off on philosophical
tangents.  Answer that, and maybe there'll be a protocol that you
can use.

				Bear



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post