<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.ietf-kitten-pkinit-alg-agility" target="https://datatracker.ietf.org/doc/html/draft-ietf-kitten-pkinit-alg-agility-08">
   <front>
      <title>Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) Algorithm Agility</title>
      <author initials="L." surname="Astrand" fullname="Love Astrand">
         <organization>Apple, Inc</organization>
      </author>
      <author initials="L." surname="Zhu" fullname="Larry Zhu">
         <organization>Oracle Corporation</organization>
      </author>
      <author initials="M." surname="Cullen" fullname="Margaret Cullen">
         <organization>Painless Security</organization>
      </author>
      <author initials="M." surname="Cullen" fullname="Margaret Cullen">
         <organization>Painless Security</organization>
      </author>
      <author initials="G." surname="Hudson" fullname="Greg Hudson">
         <organization>MIT</organization>
      </author>
      <date month="April" day="20" year="2019" />
      <abstract>
	 <t>This document updates the Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) standard (RFC 4556) to remove protocol structures tied to specific cryptographic algorithms. The PKINIT key derivation function is made negotiable, and the digest algorithms for signing the pre-authentication data and the client&#x27;s X.509 certificates are made discoverable.

 These changes provide preemptive protection against vulnerabilities discovered in the future in any specific cryptographic algorithm and allow incremental deployment of newer algorithms.
	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-kitten-pkinit-alg-agility-08" />
   
</reference>
