Design Principles and Security of Authentication Protocols with Trusted Third Party

Two-way identity authentication is the basis of secure communication in a distributed application environment. A trusted third party (TTP) is needed while PKI is not applicable, and the design of authentication protocols with TTP is a complicate and challenging task. This paper examines the characteristics of the security of authentication protocols with TTP, summarizes the essential factors of session key and illustrates the potential attacks while these essential factors are not well considered. It also proposes some design principles and a model of authentication protocol with TTP.

[1]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[2]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[3]  Dan Harkins,et al.  The Internet Key Exchange (IKE) , 1998, RFC.

[4]  Martín Abadi,et al.  Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..

[5]  Owen Rees,et al.  Efficient and timely mutual authentication , 1987, OPSR.

[6]  John C. Mitchell,et al.  Undecidability of bounded security protocols , 1999 .

[7]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[8]  John A. Clark,et al.  A survey of authentication protocol literature: Version 1.0 , 1997 .

[9]  Paul Syverson,et al.  A Taxonomy of Replay Attacks , 1994 .

[10]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[11]  Gavin Lowe Analyzing a Library of Security Protocols using Casper and FDR , 1999 .

[12]  Peter Jorgensen,et al.  Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .

[13]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[14]  Ulf Carlsen Optimal privacy and authentication on a portable communications system , 1994, OPSR.

[15]  Giovanni Maria Sacco,et al.  Timestamps in key distribution protocols , 1981, CACM.

[16]  Li Gong,et al.  Variations on the themes of message freshness and replay-or the difficulty in devising formal methods to analyze cryptographic protocols , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.