On 10/19/2017 10:59 AM, Hannes Tschofenig wrote:
I suspect the idea is the following:
1) First, you would decrypt the packet and validate the mac (assuming that it
is an AEAD cipher)
2) You execute the operation to meet the latency requirements.
3) Then, you can take time to verify the digital signature (outside the latency
requirements)
Is that the idea?
It can't possibly be. What do you do if the digital signature doesn't
verify? Reverse the operation? Flicker the lights? Go back to the
original levels? Flash "OOPS" in morse code?
You need to verify the signature in advance of doing an operation
authenticated and authorized by that signature....
Mike
_______________________________________________
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace