To: Vesa Lehtovirta vesa.lehtovi...@ericsson.com, Patrik Salmela
patrik.salm...@ericsson.com, Vesa Lehtovirta
vesa.lehtovi...@ericsson.com, Mohit Sethi
mohit.m.se...@ericsson.com, Mohit Sethi mohit.m.se...@ericsson.com,
Patrik Salmela patrik.salm...@ericsson.com
A new version of I-D, draft
To: Jari Arkko <jari.ar...@piuha.net>, Heidi-Maria Back
<heidi-maria.b...@ericsson.com>, Heidi-Maria Back
<heidi-maria.b...@ericsson.com>, Ari Keranen <ari.kera...@ericsson.com>,
Mohit Sethi <mohit.m.se...@ericsson.com>, Jari Arkko
I didn't find anything about P-256 (CoAP's current MTI curve) or the
25519 curves, which are the more likely ones to be used going forward.
So I'm wondering a bit what an implementer of IETF IoT protocols can
take home specifically here.
Mohit Sethi wrote:
Please see the responses inline.
On 07/25/2016 07:23 AM, Hannes Tschofenig wrote:
I have a question regarding draft-aks-lwig-crypto-sensors-00.
Table 2 shows ECDSA signature performance with TinyECC. The execution
time in the first row says 1,858 msec. A different writing style for
Subject:New Version Notification for
Date: Thu, 30 Jun 2016 02:48:04 -0700
To: Mohit Sethi <mo...@piuha.net>, Heidi-Maria Back
<heidi-maria.b...@ericsson.com>, Jari Arkko <jari.ar...@piuha.net
On Thu, Jun 30, 2016 at 6:11 PM, Mohit Sethi <mohit.m.se...@ericsson.com> wrote:
We have uploaded the next version of our draft documenting the
implementation experiences of public-key cryptography on 8-bit
micro-controllers. The draft is availa
The chair has asked me to do the shepherd write up for
I have gone through the document again and I have some comments that I
think should be addressed first. Most of them are minor and editorial in
nature. It would be great if the authors can
We have submitted the next version of the working group document
"draft-ietf-lwig-crypto-sensors". The next version can be found here:
The draft has mostly undergone minor changes since the last IETF. We
I had refrained from responding earlier because there was an ongoing
discussion about this draft within the IoT directorate. I wanted to wait
for it to conclude before responding. But in any case, here is my response:
This is how you want to solve the IoT security problem:
I have read this draft. I find this draft relevant for the working
group. I was happy to see in the presentation during IETF 99 on how the
different constrained OS implement the TCP stack.
+1 for adoption call.
On 08/11/2017 11:34 AM, IETF Secretariat wrote:
The LWIG WG has
I have read a previous version of this draft. The draft has already
provided useful input to the neighbor discovery work ongoing in 6lo.
I believe this work is relevant for the working group. +1 for the
On 08/11/2017 12:49 PM, IETF Secretariat wrote:
The authors of the document believe that it is ready to move forward.
During the previous last call we had already received support from
several working group members.
Based on the feedback during the previous last call, we removed the
performance measurements of RSA key sizes
Authors : Mohit Sethi
Pages : 31
xperiences with those
libraries for signing operation on small devices.
Von: Mohit Sethi [mailto:mohit.m.se...@ericsson.com]
Gesendet: Montag, 7. August 2017 18:20
An: Tobias Guggemos <gugge...@nm.ifi.lmu.de>; Carsten Bormann <c...@tzi.org>
On Aug 6, 2017, at 12:18, Mohit Sethi <mohit.m.se...@ericsson.com> wrote:
The authors of the document believe that it is ready to move forward. During
the previous last call we had already received support from several working
should say that this
document discusses security architectures and cryptographic functions for
Just a thought to avoid missunderstandings.
Von: Lwip [mailto:lwip-boun...@ietf.org] Im Auftrag von Mohit Sethi
Mail list logo