> Quick question:  does anyone know of technology or techniques that would
> facilitate strong authentication (_not_ encryption) for unattended high
> volume electronic transactions and does not require strong crypto along
> the lines of DSA or RSA?  Shared secrets are not an option.

There are strong identification protocols, most of which are
mathematically related to RSA and DSA, but which are for identification
rather than encryption or signature.  Schneier devotes chapter 21 to
discussing several of these.  Most of the ID protocols are closely
related to signature schemes, but if you have a political need to say
that you aren't doing signatures, these might fill the bill.

Reply via email to