Jun Hu \(Nokia\) <jun.hu=40nokia....@dmarc.ietf.org> wrote:
    > So if A just passthrough Y's certificate payload to X in the IKE_AUTH
    > response A sent to X, how could A signs the AUTH payload without having
    > Y's private key that corresponds to Y's certificate?

The CRQC was able to break the quantum-unsafe algorithm, turning a public key
into a private key.
(That's the point of the CRQC)

--
Michael Richardson <mcr+i...@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide




Attachment: signature.asc
Description: PGP signature

_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to