On 20.09.2013 16:23, Phillip Hallam-Baker wrote:
For example, do we really need 30 different authentication algorithms in
a protocol? Whenever we talk about authentication we end up with a new
framework on the existing frameworks rather than just picking one.

I don't think that there is something wrong with an authentication framework as such. You know why we are not just picking one authentication algorithm, one cryptographic primitive, one credential type, etc.


Reply via email to