Deploying a New Hash Algorithm Bellovin/Rescorla paper presented at NDSS conference Difficulty of transitioning to SHA-2 in particular and crypto algorithms in general Established rough criteria for algorithm agility Specifications are algorithm independent Client & server securely signal capabilities/requirements |