Hi Tony, If I understand your idea correctly then you have just re-invented the raw public key concept defined in https://tools.ietf.org/html/rfc7250
Ciao Hannes From: Ace [mailto:[email protected]] On Behalf Of Tony Putman Sent: 06 December 2017 14:42 To: [email protected] Subject: [Ace] Independent I-D for new TLS authentication (triple-ECDH) Hi, I recently produced an I-D for a TLS authentication method using pre-shared ECDH asymmetric keys, which I believe will be useful for constrained environments. IMHO the key benefits are: - a breach of server security does not result in client impersonation (unlike PSK) - a single EC algorithm is used (ECDH), though it is used several times - static public keys are not exchanged, so protocol messages are smaller I would like to know if people working with constrained devices agree with me that these are useful benefits and whether people feel that this is worth pursuing. The draft is at https://datatracker.ietf.org/doc/draft-putman-tls-preshared-ecdh/ Thanks, Tony Dyson Technology Limited, company number 01959090, Tetbury Hill, Malmesbury, SN16 0RP, UK. This message is intended solely for the addressee and may contain confidential information. If you have received this message in error, please immediately and permanently delete it, and do not use, copy or disclose the information contained in this message or in any attachment. Dyson may monitor email traffic data and content for security & training. IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
_______________________________________________ Ace mailing list [email protected] https://www.ietf.org/mailman/listinfo/ace
