Interconnecting domains with heterogeneous key distribution and authentication protocols

F. Piessens, B. De Decker, P. Janson
Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy  
In this paper, a number of mechanisms are described that can be used in the design of a protocol convertor for authentication and key distribution protocols. First, the scope of the mechanisms is de ned: we mark out the class of authentication systems that were considered during the design of the mechanisms. A rst mechanism, based on proxies and a synchronization protocol, allows for a transparant protocol conversion. It is generic, and can easily be tailored to di erent speci c situations. The
more » ... second mechanism addresses the problem of the statefulness of the protocol convertor. It can be used to o oad state from the convertor to the principals of the interconnected domains, thus making the convertor more robust. Both mechanisms can be used separately or in combination. When properly combined, they provide for a robust, transparant, and safe protocol convertor for authentication and key distribution protocols.
doi:10.1109/risp.1993.287642 dblp:conf/sp/PiessensDJ93 fatcat:bf2h2iq6b5dfppie2gwqkiu3oa