Mike Borza <[email protected]> wrote:
    > They don't mention IKEv2.  I don't know IKEv2 well enough to know
    > whether there are any symmetric PSK authentication schemes, but if not,
    > perhaps there should be.  The point they're making is that the

There are PSK methods.
But, all the methods also use traditional DH, and IKEv2 defines ECDH methods
(AFAIK, haven't implemented yet).

I wonder if QC factoring of ECC easier than finding
SHA1/SHA2/etc. collisions, or if there is less effort being spent on the
secure hashes.

--
Michael Richardson <[email protected]>, Sandelman Software Works
 -= IPv6 IoT consulting =-



Attachment: signature.asc
Description: PGP signature

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to