Hi, I am sorry for the late comments
I have looked at the algorithm draft and have a some top level concerns. Firstly you have the sections that describe the operation in detail and the python code both as normative. That is always a dangerous thing to do since it is not clear which has priority in the event of a difference. I am concerned that the algorithm, which can stand on it's own right and a comparison with other methods is included in this text. I think that the comparison text from this draft and from the architecture draft should be put into a single comprehensive evaluation draft. Again I am concerned about the assertion of completeness, since it is complete only against a number of unstated constraints. Finally the authors have clearly copied the security section from the architecture draft. Whilst I am sure that the algorithm has no security concerns per se, that is only because it is placed in an operational context by code that does input parameter filtering and an operating system that ensures it executes correctly. What I would expect from a security analysis was guidance to the implementers of any particular fragility in the algorithm that they needed to consider (there may of course be none). - Stewart
_______________________________________________ rtgwg mailing list [email protected] https://www.ietf.org/mailman/listinfo/rtgwg
