[10661] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: authentication protocols

daemon@ATHENA.MIT.EDU (Ben Laurie)
Fri Mar 29 16:25:02 2002

Message-ID: <3CA47B8E.EB037B8C@algroup.co.uk>
Date: Fri, 29 Mar 2002 14:34:54 +0000
From: Ben Laurie <ben@algroup.co.uk>
MIME-Version: 1.0
To: John Saylor <johns@worldwinner.com>
Cc: cryptography@wasabisystems.com
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

John Saylor wrote:
> 
> Hi
> 
> I'd like to find an authentication protocol that fits my needs:
> 1. 2 [automated] parties
> 2. no trusted 3rd party intemediary ['Trent' in _Applied_Crypto_]
> 
> Most of the stuff in _Applied_Crypto_ requires that third party. It may
> be an impossible task, nothing seems obvious to me. Pointers,
> suggestions, or aphorisms all welcome.

You need to specify what you are trying to achieve! For example, its
easy to avoid third parties if you have already exchanged keys.

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post