IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Elliptic-Curve Algorithm Integration in the Secure Shell Transport Layer



> 	- section 4, this might be just a language issue; does this imply 
> that the remote key pair is ephemeral as well or not? Or would it be better 
> to say "and ephemeral remote public key"?
> 
>    The Elliptic Curve Diffie-Hellman (ECDH) key exchange method
>    generates a shared secret from an ephemeral elliptic curve local
>    private key and remote public key.

Maybe "...from ephemeral elliptic curve local private and remote public
keys"?

> 	wrt the SSH protocol I think it should work as defined but obviously 
> a reference implementation might reveal more.

I think reference implementations are a bad idea; I much prefer sample
implementations.  (The difference is that a reference implementation by
definition _is_ the spec in an operational form, and if it disagrees
with some other spec, there's no a priori way to tell which is wrong.
If a sample implementation disagrees with the spec, there's no question
- the sample implementation is wrong.)

/~\ The ASCII				  Mouse
\ / Ribbon Campaign
 X  Against HTML		mouse%rodents-montreal.org@localhost
/ \ Email!	     7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B



Home | Main Index | Thread Index | Old Index