On 10/19/2017 10:59 AM, Hannes Tschofenig wrote:
I suspect the idea is the following:

1) First, you would decrypt the packet and validate the mac (assuming that it 
is an AEAD cipher)
2) You execute the operation to meet the latency requirements.
3) Then, you can take time to verify the digital signature (outside the latency 
requirements)

Is that the idea?


It can't possibly be.   What do you do if the digital signature doesn't verify?  Reverse the operation?   Flicker the lights?  Go back to the original levels?  Flash "OOPS" in morse code?

You need to verify the signature in advance of doing an operation authenticated and authorized by that signature....

Mike

_______________________________________________
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace

Reply via email to