I suspect the idea is the following:

1) First, you would decrypt the packet and validate the mac (assuming that it 
is an AEAD cipher)
2) You execute the operation to meet the latency requirements.
3) Then, you can take time to verify the digital signature (outside the latency 
requirements)

Is that the idea?

-----Original Message-----
From: Beck, Stefan [mailto:s.b...@osram.com]
Sent: 19 October 2017 15:21
To: Hannes Tschofenig; ace@ietf.org
Subject: RE: multicast

Yes, correct.

Stevie

> -----Original Message-----
> From: Hannes Tschofenig [mailto:hannes.tschofe...@arm.com]
> Sent: Thursday, October 19, 2017 2:52 PM
> To: Beck, Stefan <s.b...@osram.com>; ace@ietf.org
> Subject: RE: multicast
>
> Hi Stefan,
>
> I am trying to understand your ideas.
>
> ~snip ~
>
> > For multicast, my focus is on using asymmetric encryption for
> authentication & integrity, and using symmetric encryption for
confidentiality.
>
> In your view, you are sending a multicast message that will contain a
digital
> signature and is also encrypted using symmetric key crypto?
>
> Is this correct?
>
> Ciao
> Hannes
> IMPORTANT NOTICE: The contents of this email and any attachments are
> confidential and may also be privileged. If you are not the intended
recipient,
> please notify the sender immediately and do not disclose the contents to
any
> other person, use it for any purpose, or store or copy the information in
any
> medium. Thank you.
IMPORTANT NOTICE: The contents of this email and any attachments are 
confidential and may also be privileged. If you are not the intended recipient, 
please notify the sender immediately and do not disclose the contents to any 
other person, use it for any purpose, or store or copy the information in any 
medium. Thank you.

_______________________________________________
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace

Reply via email to