Use of SM2 and SM3 algorithms in DNSKEY and RRSIG Resource Records for
DNSSEC
draft-deng-sec-dnsec-alg-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Guangqing Deng , Sean Shen , Ning Kong | ||
Last updated | 2013-04-18 (Latest revision 2012-10-15) | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | WG state | (None) | |
Document shepherd | (None) | ||
IESG | IESG state | Expired | |
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document describes how to generate signature and hash using SM2 and SM3 algorithms for DNSKEY, RRSIG and DS resource records in Domain Name System Security Extensions (DNSSEC).
Authors
Guangqing Deng
Sean Shen
Ning Kong
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)