John Saylor wrote: > > Hi > > I'd like to find an authentication protocol that fits my needs: > 1. 2 [automated] parties > 2. no trusted 3rd party intemediary ['Trent' in _Applied_Crypto_] > > Most of the stuff in _Applied_Crypto_ requires that third party. It may > be an impossible task, nothing seems obvious to me. Pointers, > suggestions, or aphorisms all welcome.
You need to specify what you are trying to achieve! For example, its easy to avoid third parties if you have already exchanged keys. Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]