Tentative Requirements 1. No single KM scheme will work for all DTNs therefore a set of schemes, or a framework, is REQUIRED. 2. All schemes MUST support some well-defined BSP ciphersuite(s). 3. At least one scheme SHOULD be defined for each of: 1. Manual keying, i.e. pre-shared secrets or pre-installed public keys; 2. Key transport & key agreement options. 4. Schemes SHOULD be able to use extension blocks to piggy-back KM information with application-data handling bundles. 5. Schemes MAY involve use of specific bundle payloads. 6. Some schemes MUST be defined using standard, well-known techniques (e.g. RSA key transport). 7. DTN node connectivity, computation and storage capabilities vary enormously, so some scheme for highly challenged nodes SHOULD be defined. |