Jun Hu \(Nokia\) <jun.hu=40nokia....@dmarc.ietf.org> wrote: > So if A just passthrough Y's certificate payload to X in the IKE_AUTH > response A sent to X, how could A signs the AUTH payload without having > Y's private key that corresponds to Y's certificate?
The CRQC was able to break the quantum-unsafe algorithm, turning a public key into a private key. (That's the point of the CRQC) -- Michael Richardson <mcr+i...@sandelman.ca> . o O ( IPv6 IøT consulting ) Sandelman Software Works Inc, Ottawa and Worldwide
signature.asc
Description: PGP signature
_______________________________________________ IPsec mailing list -- ipsec@ietf.org To unsubscribe send an email to ipsec-le...@ietf.org