Review of RFC 3278 Update2008-03-20 10:02:11Sean, a couple of comments. 1. I think you need to look at updating section 5. Which of the hash algorithms are considered to be mandatory to implement for ECDSA? 2. I don't know if there is any degree of tie-in between the set of ECC curves and the hash algorithms being specified. I know there are some correspondences for DSA. I believe that this should be stated either way, potentially as a security consideration. 3. Is there a reason that you have not updated section 7? jim
|
|