| < draft-ietf-ipsecme-esp-ah-reqts-06.txt | draft-ietf-ipsecme-esp-ah-reqts-07.txt > | |||
|---|---|---|---|---|
| Network Working Group D. McGrew | Network Working Group D. McGrew | |||
| Internet-Draft Cisco Systems | Internet-Draft Cisco Systems | |||
| Obsoletes: 4835 (if approved) P. Hoffman | Obsoletes: 4835 (if approved) P. Hoffman | |||
| Intended status: Standards Track VPN Consortium | Intended status: Standards Track VPN Consortium | |||
| Expires: October 20, 2014 April 18, 2014 | Expires: October 20, 2014 April 18, 2014 | |||
| Cryptographic Algorithm Implementation Requirements and Usage Guidance | Cryptographic Algorithm Implementation Requirements and Usage Guidance | |||
| for Encapsulating Security Payload (ESP) and Authentication Header (AH) | for Encapsulating Security Payload (ESP) and Authentication Header (AH) | |||
| draft-ietf-ipsecme-esp-ah-reqts-06 | draft-ietf-ipsecme-esp-ah-reqts-07 | |||
| Abstract | Abstract | |||
| This Internet Draft is standards track proposal to update to the | This Internet Draft is a standards track proposal to update the | |||
| Cryptographic Algorithm Implementation Requirements for ESP and AH; | Cryptographic Algorithm Implementation Requirements for ESP and AH; | |||
| it also adds usage guidance to help in the selection of these | it also adds usage guidance to help in the selection of these | |||
| algorithms. | algorithms. | |||
| The Encapsulating Security Payload (ESP) and Authentication Header | The Encapsulating Security Payload (ESP) and Authentication Header | |||
| (AH) protocols makes use of various cryptographic algorithms to | (AH) protocols make use of various cryptographic algorithms to | |||
| provide confidentiality and/or data origin authentication to | provide confidentiality and/or data origin authentication to | |||
| protected data communications in the IP Security (IPsec) | protected data communications in the IP Security (IPsec) | |||
| architecture. To ensure interoperability between disparate | architecture. To ensure interoperability between disparate | |||
| implementations, the IPsec standard specifies a set of mandatory-to- | implementations, the IPsec standard specifies a set of mandatory-to- | |||
| implement algorithms. This document specifies the current set of | implement algorithms. This document specifies the current set of | |||
| mandatory-to-implement algorithms for ESP and AH, specifies | mandatory-to-implement algorithms for ESP and AH, specifies | |||
| algorithms that should be implemented because they may be promoted to | algorithms that should be implemented because they may be promoted to | |||
| mandatory at some future time, and also recommends against the | mandatory at some future time, and also recommends against the | |||
| implementation of some obsolete algorithms. Usage guidance is also | implementation of some obsolete algorithms. Usage guidance is also | |||
| provided to help the user of ESP and AH best achieve their security | provided to help the user of ESP and AH best achieve their security | |||
| End of changes. 3 change blocks. | ||||
| 3 lines changed or deleted | 3 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||