Skip to content

Commit

Permalink
added link to static DH attack paper
Browse files Browse the repository at this point in the history
  • Loading branch information
sftcd committed Jul 18, 2017
1 parent 39d6933 commit cf9196f
Showing 1 changed file with 6 additions and 0 deletions.
6 changes: 6 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -163,6 +163,12 @@ last minute, indicating that IETF participants do not value their inputs.
(I admit that is speculative, but it's based on some previous discussions on the WG
list - it'd be good to get feedback from researchers to check.)

1. Kenny Paterson (private communication, quoted with permission) notes that
history has shown that static DH in TLS (and elsewhere) is not "implementation
robust" - another relevant attack is
[this](http://nds.rub.de/media/nds/veroeffentlichungen/2015/09/14/main-full.pdf)
one which is quite spectacular.

1. There could be similar problems caused for the QUIC protocol development
work, as that relies upon TLS1.3 and has similar design elements that
could be perturbed if static DH private values were used. And QUIC has recently
Expand Down

0 comments on commit cf9196f

Please sign in to comment.