[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: draft-ietf-ipsec-ciph-cbc-02.txt



Paul Koning <pkoning@xedia.com> wrote:
> This is a very simple case of designing a protocol for extensibility.

Hmm.. speaking of weak keys, I've not figured out what to do if all keys
become weak.

[Of course, the protocol will have to be updated, but other than lying
about my public key in some site-site pre-arranged manner, I don't see
any natural avenues of approach.]

[[And, lest someone start quoting the age of the universe at me, I'm
worried about the risk of massively parallel attacks: do we just scrap
the whole system if someone builds a 128 bit quantum computer?]]

[[[I'm sure this topic has been discussed before, and don't want to
see this derail anything.  If there's a reference on the subject,
just point me at it?]]]

Thanks,

-- 
Raul




References: