[TLS] draft-fossati-tls-iot-optimizations-00, 4.2, hash chain

2016-10-31 Thread Kraus Achim (INST/ESY1)
Dear Authors, draft-fossati-tls-iot-optimizations-00 mentions in 4.2, page 5, a hash chain (Lampert, "Password Authentication with Insecure Communication"). Would it be possible, to get more details about that approach? In my opinion, DTLS needs a connection id, the record is usually secured b

Re: [TLS] [ALU] Re: extending the un-authenticated DTLS header

2016-11-16 Thread Kraus Achim (INST/ESY1)
Hi, I'm still wondering, why the "clashing" calculations (section 4) are only based on the number of clients and not also on the length of the hash chain. As I understood the hash chain, the DTLS server and client calculates a list of CIDs. Though the client chose one, the server has to prepare