Jun Hu \(Nokia\) <[email protected]> wrote:
    > So if A just passthrough Y's certificate payload to X in the IKE_AUTH
    > response A sent to X, how could A signs the AUTH payload without having
    > Y's private key that corresponds to Y's certificate?

The CRQC was able to break the quantum-unsafe algorithm, turning a public key
into a private key.
(That's the point of the CRQC)

--
Michael Richardson <[email protected]>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide




Attachment: signature.asc
Description: PGP signature

_______________________________________________
IPsec mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to