[HJ] sure, but my understanding is the attack we are discussing here doesn't 
rely on a CRQC 

Jun Hu \(Nokia\) <[email protected]> wrote:
    > So if A just passthrough Y's certificate payload to X in the IKE_AUTH
    > response A sent to X, how could A signs the AUTH payload without having
    > Y's private key that corresponds to Y's certificate?

The CRQC was able to break the quantum-unsafe algorithm, turning a public key 
into a private key.
(That's the point of the CRQC)

--
Michael Richardson <[email protected]>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide




_______________________________________________
IPsec mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to