Advice on Writing an Internet Draft Amenable to Security Analysis
draft-irtf-cfrg-advice-00
This document is an Internet-Draft (I-D) that has been submitted to the Internet Research Task Force (IRTF) stream.
This I-D is not endorsed by the IETF and has no formal standing in the
IETF standards process.
Document | Type |
Expired Internet-Draft
(cfrg RG)
Expired & archived
|
|
---|---|---|---|
Author | Carol J. Meadows | ||
Last updated | 2002-10-24 | ||
RFC stream | Internet Research Task Force (IRTF) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | IRTF state | (None) | |
Consensus boilerplate | Unknown | ||
Document shepherd | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
In this document we give guidelines for writing Internet Drafts in order to facilitate their security analysis. By 'security analysis' we mean, not only informal analyses, but formal analyses using automated tools, and mathematical analysis of the cryptographic protocols used in an Internet Draft.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)