IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Elliptic-Curve Algorithm Integration in the Secure Shell Transport Layer
> - section 4, this might be just a language issue; does this imply
> that the remote key pair is ephemeral as well or not? Or would it be better
> to say "and ephemeral remote public key"?
>
> The Elliptic Curve Diffie-Hellman (ECDH) key exchange method
> generates a shared secret from an ephemeral elliptic curve local
> private key and remote public key.
Maybe "...from ephemeral elliptic curve local private and remote public
keys"?
> wrt the SSH protocol I think it should work as defined but obviously
> a reference implementation might reveal more.
I think reference implementations are a bad idea; I much prefer sample
implementations. (The difference is that a reference implementation by
definition _is_ the spec in an operational form, and if it disagrees
with some other spec, there's no a priori way to tell which is wrong.
If a sample implementation disagrees with the spec, there's no question
- the sample implementation is wrong.)
/~\ The ASCII Mouse
\ / Ribbon Campaign
X Against HTML mouse%rodents-montreal.org@localhost
/ \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B
Home |
Main Index |
Thread Index |
Old Index