Use of SM2 and SM3 algorithms in DNSKEY and RRSIG Resource Records for
DNSSEC
draft-deng-sec-dnsec-alg-00
| Document | Type | Expired Internet-Draft (individual) | |
|---|---|---|---|
| Authors | Guangqing Deng , Sean Shen , Ning Kong | ||
| Last updated | 2013-04-18 (Latest revision 2012-10-15) | ||
| Stream | Internet Engineering Task Force (IETF) | ||
| Intended RFC status | (None) | ||
| Formats |
Expired & archived
plain text
htmlized
pdfized
bibtex
|
||
| Stream | WG state | (None) | |
| Document shepherd | (None) | ||
| IESG | IESG state | Expired | |
| Consensus boilerplate | Unknown | ||
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
https://www.ietf.org/archive/id/draft-deng-sec-dnsec-alg-00.txt
Abstract
This document describes how to generate signature and hash using SM2 and SM3 algorithms for DNSKEY, RRSIG and DS resource records in Domain Name System Security Extensions (DNSSEC).
Authors
Guangqing Deng
Sean Shen
Ning Kong
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)