pkix-3----Page:2
1  2  3  4  5  6  7  8  9  10 

Bellovin / Rescorla Analysis
Bellovin and Rescorla gave a presentation at the IETF 63 Hash BOF
Analysis into IETF security protocols
Hash algorithm independence
Ease of transition to new hash functions
Many protocols were found wanting
They did not look at OCSP, so I did …
PPT Version