@techreport{ietf-ipsec-ciph-sha-256-01, number = {draft-ietf-ipsec-ciph-sha-256-01}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-ipsec-ciph-sha-256/01/}, author = {Scott G. Kelly and Sheila Frankel}, title = {{The HMAC-SHA-256-96 Algorithm and Its Use With IPsec}}, pagetotal = 10, year = 2002, month = jun, day = 28, abstract = {This document describes the use of the HMAC algorithm in conjunction with the SHA-256 algorithm as an experimental authentication mecha- nism within the context of the IPsec AH and ESP protocols. This algo- rithm is intended to provide data origin authentication and integrity protection. Given the current lack of practical experience with SHA-256, implementations based on this document will be experimental in nature, and implementation is not required in order to claim com- pliance with the IPsec proposed standards. The version of the HMAC- SHA-256 authenticator described in this document specifies truncation to 128 bits, and is therefore named HMAC-SHA-256-128.}, }