On 20.09.2013 16:23, Phillip Hallam-Baker wrote:
For example, do we really need 30 different authentication algorithms in a protocol? Whenever we talk about authentication we end up with a new framework on the existing frameworks rather than just picking one.
I don't think that there is something wrong with an authentication framework as such. You know why we are not just picking one authentication algorithm, one cryptographic primitive, one credential type, etc.