Hiya, On 01/10/2014 04:42 PM, Watson Ladd wrote: > I think prime field elliptic curves would be more amenable to > implementation in restricted router > hardware.
Could be. If this doesn't turn out to be DOA then I'd fully expect a bunch of discussion on that. For now, we just picked MODP to avoid having to worry about IPR FUDdiness. > How the receiver computes the nonce that goes with the packet is not > obvious to me from > what is written. Oops. Needs a fix:-) > Otherwise this seems reasonable: it might be worth considering if this > can be extended to > authenticate both sides cleanly if some large networks want to be safe > against that. Not sure what you mean by cleanly? Thanks for the comments, S. _______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
