The HMAC-SHA-256-96 Algorithm and Its Use With IPsec
draft-ietf-ipsec-ciph-sha-256-01

Document Type Expired Internet-Draft (ipsec WG)
Authors Scott Kelly  , Sheila Frankel 
Last updated 2015-10-14 (latest revision 2002-06-28)
Stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream WG state WG Document
Document shepherd No shepherd assigned
IESG IESG state Expired (IESG: Dead)
Action Holders
(None)
Consensus Boilerplate Unknown
Telechat date
Responsible AD Steven Bellovin
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-ietf-ipsec-ciph-sha-256-01.txt

Abstract

This document describes the use of the HMAC algorithm in conjunction with the SHA-256 algorithm as an experimental authentication mecha- nism within the context of the IPsec AH and ESP protocols. This algo- rithm is intended to provide data origin authentication and integrity protection. Given the current lack of practical experience with SHA-256, implementations based on this document will be experimental in nature, and implementation is not required in order to claim com- pliance with the IPsec proposed standards. The version of the HMAC- SHA-256 authenticator described in this document specifies truncation to 128 bits, and is therefore named HMAC-SHA-256-128.

Authors

Scott Kelly (scott@bstormnetworks.com)
Sheila Frankel (sheila.frankel@nist.gov)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)