Hi Tony,

If I understand your idea correctly then you have just re-invented the raw 
public key concept defined in https://tools.ietf.org/html/rfc7250

Ciao
Hannes


From: Ace [mailto:[email protected]] On Behalf Of Tony Putman
Sent: 06 December 2017 14:42
To: [email protected]
Subject: [Ace] Independent I-D for new TLS authentication (triple-ECDH)

Hi,

I recently produced an I-D for a TLS authentication method using pre-shared 
ECDH asymmetric keys, which I believe will be useful for constrained 
environments.  IMHO the key benefits are:
- a breach of server security does not result in client impersonation (unlike 
PSK)
- a single EC algorithm is used (ECDH), though it is used several times
- static public keys are not exchanged, so protocol messages are smaller

I would like to know if people working with constrained devices agree with me 
that these are useful benefits and whether people feel that this is worth 
pursuing.

The draft is at 
https://datatracker.ietf.org/doc/draft-putman-tls-preshared-ecdh/

Thanks,
Tony


Dyson Technology Limited, company number 01959090, Tetbury Hill, Malmesbury, 
SN16 0RP, UK.
This message is intended solely for the addressee and may contain confidential 
information. If you have received this message in error, please immediately and 
permanently delete it, and do not use, copy or disclose the information 
contained in this message or in any attachment.
Dyson may monitor email traffic data and content for security & training.
IMPORTANT NOTICE: The contents of this email and any attachments are 
confidential and may also be privileged. If you are not the intended recipient, 
please notify the sender immediately and do not disclose the contents to any 
other person, use it for any purpose, or store or copy the information in any 
medium. Thank you.
_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace

Reply via email to