[164251] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Google's QUIC

daemon@ATHENA.MIT.EDU (Darius Jahandarie)
Tue Jul 2 14:40:29 2013

In-Reply-To: <20130702183558.GA14948@pob.ytti.fi>
Date: Tue, 2 Jul 2013 14:40:03 -0400
From: Darius Jahandarie <djahandarie@gmail.com>
To: Saku Ytti <saku@ytti.fi>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Tue, Jul 2, 2013 at 2:35 PM, Saku Ytti <saku@ytti.fi> wrote:
> On (2013-06-29 23:36 +0100), Tony Finch wrote:
>
>> Reminds me of MinimaLT: http://cr.yp.to/tcpip/minimalt-20130522.pdf
>
> Now that I read separate 'QUIC Crypto' page. It sounds bit of a deja vu.
>
> QUIC also uses Curve25519 pubkey and Salsa20 cipher, which is hard to
> attribute as chance, considering both are DJB's work, both are used by his
> NaCl library and by extension by MinimaLT. Neither is particularly common
> algorithm.

Taking into consideration these are the best algorithms in their class
currently, it would be more surprising to me if they weren't used.

--
Darius Jahandarie


home help back first fref pref prev next nref lref last post