I went through this draft, and I was struck how underspecified this is.  In 
particular, they do not mention what processing that each side does.

This would not appear to be a trivial point; it is hard to see how we are 
supposed to verify that the protocol achieves its security goals if we aren't 
given the details of the protocol (and the operations that both sides do are 
'parts of the protocol').

Furthermore, I don't see how a KEM-based authentication scheme can be as 
efficient (in number of exchanges) as a signature-based one.  For signature 
authentication (for Alice to authenticate to Bob), Alice passes her public key 
(within her certificate) and a signature of something (which ties this to this 
specific exchange); Bob verifies the certificate and the signature.  For KEM 
authentication, what would appear to be necessary is that Alice passes her 
public key (within her certificate), Bob generates a shared secret/ciphertext 
with Alice's public key, and passes the ciphertext to Alice, who then decrypts 
it, and then send back a message to Bob that depends on the decryption.

Now, it would appear to me that this additional message passing would require 
additional exchanges - not a deal breaker, but is certainly an additional cost 
(and exactly how you do it would need to be spelled out)

Actually, this is a long standing nit I have with IETF documents that do crypto 
- they are very good at 'bits-on-the-wire' formats, but often less good on 
'what is the other side supposed to do with those bits'.   In crypto, that 
latter part is usually critical.
_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to