Hiya,

On 01/10/2014 04:42 PM, Watson Ladd wrote:
> I think prime field elliptic curves would be more amenable to
> implementation in restricted router
> hardware.

Could be. If this doesn't turn out to be DOA then I'd
fully expect a bunch of discussion on that. For now,
we just picked MODP to avoid having to worry about IPR
FUDdiness.

> How the receiver computes the nonce that goes with the packet is not
> obvious to me from
> what is written.

Oops. Needs a fix:-)

> Otherwise this seems reasonable: it might be worth considering if this
> can be extended to
> authenticate both sides cleanly if some large networks want to be safe
> against that.

Not sure what you mean by cleanly?

Thanks for the comments,
S.

_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to