One correction

> On 15 Feb 2017, at 19:05, Paul Wouters <pwout...@redhat.com> wrote:
> 
>>> Nit: You need only one of the public values and the complementary
>>> private value from the other side.
>> 
>> Right.
> 
> 

Instead of this:

>    exchange provides keys for the session.  If an attacker can retrieve
>    one of the private numbers (a, or b) with the corresponding public values 
> (g**a, or g**b),
>    then the attacker can compute the secret and the keys used and

I suggest this:

>    exchange provides keys for the session.  If an attacker can retrieve
>    one of the private numbers (a or b) with the corresponding public values 
> (g**b or g**a),
>    then the attacker can compute the secret and the keys used and

This way it’s more corresponding (and without the comma)

Yoav


Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to