| 29 | |
| 30 | == Identified Agenda Items for the Design Team == |
| 31 | * Top Priority: |
| 32 | 1. IP fragmentation of certificate-carrying messages during key exchange |
| 33 | 2. Key exchange protocol: do fewer exchanges? |
| 34 | * High Priority: |
| 35 | 3. Key exchange protocol: have fewer cryptographic operations? |
| 36 | 4. Key exchange protocol: what about two-way authentication? |
| 37 | 5. Discussion about Chicken-and-Egg Problem |
| 38 | 6. Improve Handling of Cipher Suites |
| 39 | * Medium Priority |
| 40 | 7. Improve Treatment of Peer Mode |
| 41 | 8. Symmetry of Message Sizes “time_request” and “time_response” |
| 42 | 9. Use of Initial (Unsecured) Timestamps |
| 43 | 10. Seed Refresh: Should this Be Mentioned |
| 44 | 11. Discussion about Different Security Approaches |
| 45 | 12. MAC-Algorithm instead of Hash (for HMAC) Algorithm |
| 46 | |
| 47 | |
| 48 | |