The HMAC-SHA-256-96 Algorithm and Its Use With IPsec
draft-ietf-ipsec-ciph-sha-256-01
Document | Type |
Expired Internet-Draft
(ipsec WG)
Expired & archived
|
|
---|---|---|---|
Authors | Scott G. Kelly , Sheila Frankel | ||
Last updated | 2015-10-14 (Latest revision 2002-06-28) | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | WG state | WG Document | |
Document shepherd | (None) | ||
IESG | IESG state | Expired (IESG: Dead) | |
Action Holders |
(None)
|
||
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | Steven M. Bellovin | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document describes the use of the HMAC algorithm in conjunction with the SHA-256 algorithm as an experimental authentication mecha- nism within the context of the IPsec AH and ESP protocols. This algo- rithm is intended to provide data origin authentication and integrity protection. Given the current lack of practical experience with SHA-256, implementations based on this document will be experimental in nature, and implementation is not required in order to claim com- pliance with the IPsec proposed standards. The version of the HMAC- SHA-256 authenticator described in this document specifies truncation to 128 bits, and is therefore named HMAC-SHA-256-128.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)