Commit

This commit is not reachable from any branch or tag in this repository. It may be from a fork outside of this repository.

Michael Richardson committed 627b2bf

indicate that while the default is AES-CCM-16-64-128, that EDHOC provides for agility in message one

  • Participants
  • Parent commits e283fd2

Comments (0)

Files changed (1)

File draft-ietf-6tisch-minimal-security.mkd Modified

View file
  • Ignore whitespace
  • Hide word diff
 transmit to the JRC is out of scope: some networks may wish to dedicate
 specific slots for this join traffic.
 
-The join request is authenticated/encrypted end-to-end using AES-CCM-
-16-64-128 algorithm from {{I-D.ietf-cose-msg}} and a key derived from
+The join request is typically authenticated/encrypted end-to-end using AES-CCM-16-64-128
+algorithm from {{I-D.ietf-cose-msg}} and a key derived from
 the shared secret from step 3.
+This is described in detail in {{I-D.selander-ace-cose-ecdhe}}, which also provides for algorithm agility.
+
 The nonce is derived from the shared secret, the pledge's EUI64 and a
 monotonically increasing counter initialized to 0 when first starting.