A Survey of Authentication Mechanisms

Document Type Expired Internet-Draft
Last updated 2006-08-26 (latest revision 2010-02-27)
Stream IAB
Intended RFC status Informational
Expired & archived
plain text pdf html
Stream IAB state (None)
Consensus Unknown
Document shepherd No shepherd assigned
IESG IESG state Expired (IESG: Dead)
Telechat date
Responsible AD Ted Hardie
Send notices to <leslie@thinkingcat.com>, <bwijnen@lucent.com>, <ekr@rtfm.com>

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


Authentication is a common security issue for the design of Internet protocols. A wide variety of authentication technologies are available. A common problem is knowing which technology to choose or which of a variety of essentially similar implementations of a given technique to choose. This memo provides a survey of available authentication mechanisms and guidance on selecting one for a given protocol.


Eric Rescorla (ekr@rtfm.com)
Gregory Lebovitz (gregory.ietf@gmail.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)