Routing Authentication Key must be configurable on router System transition from one key to another based on system time Stronger algorithms than MD5 Rescorla-Bellovin analysis Preferable key distribution/update mechanism Note: current routing protocol specification (standard track) on authentication is too weak to meet security requirement |