| < draft-ietf-ipsecme-aes-ctr-ikev2-06.txt | draft-ietf-ipsecme-aes-ctr-ikev2-07.txt > | |||
|---|---|---|---|---|
| IPSECME S. Shen | IPSECME S. Shen | |||
| Internet-Draft Huawei | Internet-Draft Huawei | |||
| Updates: RFC4307 Y. Mao | Updates: RFC4307 Y. Mao | |||
| (if approved) H3C | (if approved) H3C | |||
| Intended status: Standards Track NSS. Murthy | Intended status: Standards Track NSS. Murthy | |||
| Expires: October 2, 2010 Freescale Semiconductor | Expires: October 3, 2010 Freescale Semiconductor | |||
| March 31, 2010 | April 1, 2010 | |||
| Using Advanced Encryption Standard (AES) Counter Mode with IKEv2 | Using Advanced Encryption Standard (AES) Counter Mode with IKEv2 | |||
| draft-ietf-ipsecme-aes-ctr-ikev2-06 | draft-ietf-ipsecme-aes-ctr-ikev2-07 | |||
| Abstract | Abstract | |||
| This document describes the usage of Advanced Encryption Standard | This document describes the usage of Advanced Encryption Standard | |||
| Counter Mode (AES-CTR), with an explicit initialization vector, by | Counter Mode (AES-CTR), with an explicit initialization vector, by | |||
| IKEv2 for encrypting the IKEv2 exchanges that follow the IKE_SA_INIT | IKEv2 for encrypting the IKEv2 exchanges that follow the IKE_SA_INIT | |||
| exchange. | exchange. | |||
| Status of this Memo | Status of this Memo | |||
| skipping to change at page 1, line 42 ¶ | skipping to change at page 1, line 42 ¶ | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| This Internet-Draft will expire on October 2, 2010. | This Internet-Draft will expire on October 3, 2010. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2010 IETF Trust and the persons identified as the | Copyright (c) 2010 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 9, line 36 ¶ | skipping to change at page 9, line 36 ¶ | |||
| [MODES] Dworkin, M., "Recommendation for Block Cipher Modes of | [MODES] Dworkin, M., "Recommendation for Block Cipher Modes of | |||
| Operation Methods and Techniques", NIST Special | Operation Methods and Techniques", NIST Special | |||
| Publication 800-38A, December 2001, <http://csrc.nist.gov/ | Publication 800-38A, December 2001, <http://csrc.nist.gov/ | |||
| publications/nistpubs/800-38a/sp800-38a.pdf>. | publications/nistpubs/800-38a/sp800-38a.pdf>. | |||
| 7.2. Informative References | 7.2. Informative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| [RFC2404] Madson, C. and R. Glenn, "The Use of HMAC-SHA-1-96 within | ||||
| ESP and AH", RFC 2404, November 1998. | ||||
| [RFC3686] Housley, R., "Using Advanced Encryption Standard (AES) | [RFC3686] Housley, R., "Using Advanced Encryption Standard (AES) | |||
| Counter Mode With IPsec Encapsulating Security Payload | Counter Mode With IPsec Encapsulating Security Payload | |||
| (ESP)", RFC 3686, January 2004. | (ESP)", RFC 3686, January 2004. | |||
| [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", | [RFC4303] Kent, S., "IP Encapsulating Security Payload (ESP)", | |||
| RFC 4303, December 2005. | RFC 4303, December 2005. | |||
| [Recommendations] | [Recommendations] | |||
| Barker, E., Barker, W., Burr, W., Polk, W., and M. Smid, | Barker, E., Barker, W., Burr, W., Polk, W., and M. Smid, | |||
| "Recommendation for Key Management - Part1 - General | "Recommendation for Key Management - Part1 - General | |||
| End of changes. 4 change blocks. | ||||
| 7 lines changed or deleted | 4 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||