> >RFC 4753 documents that the shared secret obtained from an ECP 
Diffie-Hellman operation is the concatenation of the x and y coordinates 
of the derived point.
> >
> >Is that correct?
> 
> Yes, I believe.

Thank you, Paul.

It matters little at this point, but I am curious to hear if any other IKE 
implementors faced challenges with crypto libraries or service providers 
only generating the x coordinate.

Thanks,


Scott Moonen (smoo...@us.ibm.com)
z/OS Communications Server TCP/IP Development
http://scott.andstuff.org/
http://www.linkedin.com/in/smoonen



From:
Paul Hoffman <paul.hoff...@vpnc.org>
To:
Scott C Moonen/Raleigh/i...@ibmus, ipsec@ietf.org
Date:
07/02/2009 01:28 PM
Subject:
Re: [IPsec] IKE's DH groups 19-21, NIST, FIPS 140-2, etc.



At 3:19 PM -0400 7/1/09, Scott C Moonen wrote:
>RFC 4753 documents that the shared secret obtained from an ECP 
Diffie-Hellman operation is the concatenation of the x and y coordinates 
of the derived point.
>
>Is that correct?

Yes, I believe.

>That is a little strange to me, which is why I want to double check.  The 
y coordinate is simply a dependent variable, so including it doesn't seem 
to add much. 

It does help to keep the formats aligned. It is probably superfluous but 
harmless.

>Assuming it is correct that IKE considers the shared secret to be the 
concatenation of the x and y coordinates, does this imply that IKE's use 
of DH groups 19, 20 and 21 cannot be made to be compliant with FIPS 140-2?

No.

>  (Should I be asking this question somewhere else?)

Yes. Ask the folks at NIST.

--Paul Hoffman, Director
--VPN Consortium


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to