Design Principles and Security of Authentication Protocols with Trusted Third Party
by Xianxian Li, Jun Han and Zhaohao Sun
ABSTRACT
Two-way identity authentication is the basis of secure communication in a distributed application environment. A trusted third party (TTP) is needed while PKI is not applicable, and the design of authentication protocols with TTP is a complicate and challenging task. This paper examines the characteristics of the security of authentication protocols with TTP, summarizes the essential factors of session key and illustrates the potential attacks while these essential factors are not well considered. It also proposes some design principles and a model of authentication protocol with TTP.
Xianxian Li, Jun Han
School of Computer Science, Beihang University, Beijing, China
Zhaohao Sun
School of Economics and Information Systems, University of Wollongong
Download complete paper: Design Principles and Security of Authentication Protocols with Trusted Third Party (209K PDF)