[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: draft-ietf-ipsec-ciph-cbc-02.txt
Paul Koning <pkoning@xedia.com> wrote:
> This is a very simple case of designing a protocol for extensibility.
Hmm.. speaking of weak keys, I've not figured out what to do if all keys
become weak.
[Of course, the protocol will have to be updated, but other than lying
about my public key in some site-site pre-arranged manner, I don't see
any natural avenues of approach.]
[[And, lest someone start quoting the age of the universe at me, I'm
worried about the risk of massively parallel attacks: do we just scrap
the whole system if someone builds a 128 bit quantum computer?]]
[[[I'm sure this topic has been discussed before, and don't want to
see this derail anything. If there's a reference on the subject,
just point me at it?]]]
Thanks,
--
Raul
References: