%% You should probably cite rfc5698 instead of this I-D. @techreport{ietf-ltans-dssc-12, number = {draft-ietf-ltans-dssc-12}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-ltans-dssc/12/}, author = {Thomas Kunz and Susanne Okunick and Ulrich Pordesch}, title = {{Data Structure for the Security Suitability of Cryptographic Algorithms (DSSC)}}, pagetotal = 40, year = 2009, month = sep, day = 30, abstract = {Since cryptographic algorithms can become weak over the years, it is necessary to evaluate their security suitability. When signing or verifying data, or when encrypting or decrypting data, these evaluations must be considered. This document specifies a data structure that enables an automated analysis of the security suitability of a given cryptographic algorithm at a given point of time, which may be in the past, the present, or the future. {[}STANDARDS-TRACK{]}}, }