Skip to content

>AUUG–The Organisation for Unix, Linux and Open Source Professionals

Design Principles and Security of Authentication Protocols with Trusted Third Party

by Xianxian Li, Jun Han and Zhaohao Sun

ABSTRACT

Two-way identity authentication is the basis of secure communication in a distributed application environment.  A trusted third party (TTP) is needed while PKI is not applicable, and the design of authentication protocols with TTP is a complicate and challenging task.  This paper examines the characteristics of the security of authentication protocols with TTP, summarizes the essential factors of session key and illustrates the potential attacks while these essential factors are not well considered.  It also proposes some design principles and a model of authentication protocol with TTP.

Xianxian Li, Jun Han
School of Computer Science, Beihang University, Beijing, China

Zhaohao Sun
School of Economics and Information Systems, University of Wollongong

Download complete paper: Design Principles and Security of Authentication Protocols with Trusted Third Party (209K PDF)