On 2017-12-06 15:41, Tony Putman wrote:
Hi,

I recently produced an I-D for a TLS authentication method using pre-shared ECDH asymmetric keys, which I believe will be useful for constrained environments.  IMHO the key benefits are:

- a breach of server security does not result in client impersonation (unlike PSK)

- a single EC algorithm is used (ECDH), though it is used several times

- static public keys are not exchanged, so protocol messages are smaller

I would like to know if people working with constrained devices agree with me that these are useful benefits and whether people feel that this is worth pursuing.

The draft is at https://datatracker.ietf.org/doc/draft-putman-tls-preshared-ecdh/

Thanks,

Tony



Hi Tony,

could you explain the differences between your draft and the (D)TLS handshake with raw public keys (https://tools.ietf.org/html/rfc7250)?

/Ludwig


--
Ludwig Seitz, PhD
Security Lab, RISE SICS
Phone +46(0)70-349 92 51

_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace

Reply via email to